The Community for Technology Leaders
Security in Storage Workshop, International IEEE (2005)
San Francisco, California
Dec. 13, 2005 to Dec. 13, 2005
ISBN: 0-7695-2537-7
TABLE OF CONTENTS
Introduction

Introduction (PDF)

pp. vi
Papers

Lazy Revocation in Cryptographic File Systems (Abstract)

Michael Backes , IBM Zurich Research Laboratory, Switzerland
Christian Cachin , IBM Research Zurich Research Laboratory
Alina Oprea , Carnegie Mellon University, USA
pp. 1-11

POTSHARDS : Storing Data for the Long-term Without Encryption (Abstract)

Kevin Greenan , University of California, Santa Cruz, USA
Mark Storer , University of California, Santa Cruz, USA
Ethan L. Miller , University of California, Santa Cruz, USA
Carlos Maltzahn , University of California, Santa Cruz, USA
pp. 12-20

Towards Protecting Sensitive Files in a Compromised System (Abstract)

Xin Zhao , University of Michigan, USA
Kevin Borders , University of Michigan, USA
Atul Prakash , University of Michigan, USA
pp. 21-28

The OSD Security Protocol (Abstract)

Michael Factor , IBM Haifa Research Lab, Israel
David Nagle , Panasas, USA
Dalit Naor , IBM Haifa Research Lab, Israel
Erik Riedel , Seagate Research, USA
Julian Satran , IBM Haifa Research Lab, Israel
pp. 29-39

Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems (Abstract)

Patrick Eaton , University of California, Berkeley, USA
Hakim Weatherspoon , University of California, Berkeley, USA
John Kubiatowicz , University of California, Berkeley, USA
pp. 40-51

Maintaining Object Ordering in a Shared P2P Storage Environment (Abstract)

Germano Caronni , Sun Microsystems Laboratories
Raphael Rom , Sun Microsystems Laboratories
Glenn Scott , Sun Microsystems Laboratories
pp. 52-62

Adding Secure Deletion to Your Favorite File System (Abstract)

Nikolai Joukov , Stony Brook University
Erez Zadok , Stony Brook University
pp. 63-70

The Consequences of Decentralized Security in a Cooperative Storage System (Abstract)

Douglas Thain , University of Notre Dame, USA
Christopher Moretti , University of Notre Dame, USA
Paul Madrid , University of Notre Dame, USA
Philip Snowberger , University of Notre Dame, USA
Jeffrey Hemmes , University of Notre Dame, USA
pp. 71-82

Optimization of Covert Channel Identification (Abstract)

Jianjun Shen , Chinese Academy of Sciences, China
Sihan Qing , Chinese Academy of Sciences, China
Qingni Shen , Chinese Academy of Sciences, China
Liping Li , Chinese Academy of Sciences, China
pp. 95
Author Index

Author Index (PDF)

pp. 109
79 ms
(Ver 3.3 (11022016))