Next: About this document ...
Up: Secure and Flexible Global
Previous: Conclusions
- 1
-
Bonnie Filesystem Performance Benchmark.
https://www.textuality.com/bonnie/.
- 2
-
PostMark Filesystem Performance Benchmark.
https://www.netapp.com/tech_library/3022.html.
- 3
-
Eshwar Belani, Amin Vahdat, Thomas Anderson, and Michael Dahlin.
The CRISIS Wide Area Security Architecture.
In Proceedings of the USENIX Security Symposium, pages 15-30,
August 1998.
- 4
-
M. Blaze.
A Cryptographic File System for Unix.
In Proceedings of the 1st ACM Conference on Computer and
Communications Security, November 1993.
- 5
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis.
The KeyNote Trust Management System Version 2.
RFC 2704, September 1999.
- 6
-
M. Blaze, J. Feigenbaum, and J. Lacy.
Decentralized Trust Management.
In Proceedings of the 17th Symposium on Security and Privacy,
pages 164-173, 1996.
- 7
-
CCITT.
X.509: The Directory Authentication Framework.
International Telecommunications Union, 1989.
- 8
-
S. P. Dyer.
The Hesiod Name Server.
In Proceedings of the USENIX Winter Technical Conference,
pages 183-190, 1988.
- 9
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen.
SPKI Certificate Theory.
RFC (Proposed Standard) 2693, Internet Engineering Task Force,
September 1999.
- 10
-
J. Satran et al.
IPS Internet Draft - iSCSI.
Internet Draft, Internet Engineering Task Force, Septermber 2001.
- 11
-
K. Fu, E. Sit, and N. Faemster.
Dos and Don'ts of Client Authentication on the Web.
In Proceedings of the USENIX Security Symposium, pages
251-269, August 2001.
- 12
-
C.A. Gunter and T. Jim.
Policy-directed certificate retrieval.
SP&E, 30(15):1609-1640, 2000.
- 13
-
D. Harkins and D. Carrel.
The Internet Key Exchange (IKE).
RFC (Proposed Standard) 2409, Internet Engineering Task Force,
November 1998.
- 14
-
J.H. Howard, M.L. Kazar, S.G. Menees, D.A. Nichols, M. Satyanarayanan, R.N.
Sidebotham, and M.J. West.
Scale and Performance in a Distributed File System.
ACM Transactions on Computer Systems, 6(1):51-81, February
1988.
- 15
-
J. Schönwälder and H. Langendörfer.
Administration of large distributed UNIX LANs with BONES.
In Proceedings of the World Conference On Tools and Techniques
for System Administration, Networking, and Security, April 1993.
- 16
-
S. Kent and R. Atkinson.
Security Architecture for the Internet Protocol.
RFC (Proposed Standard) 2401, Internet Engineering Task Force,
November 1998.
- 17
-
A. D. Keromytis.
STRONGMAN: A Scalable Solution to Trust Management in
Networks.
PhD thesis, University of Pennsylvania, December 2001.
- 18
-
J. Linn.
Generic Security Service Application Program Interface, Version 2.
RFC (Proposed Standard) 2078, Internet Engineering Task Force,
January 1997.
- 19
-
D. Mazieres and M.F. Kaashoek.
Secure Applications Need Flexible Operating Systems.
In Proceedings of the 6th Workshop on Hot Topics in Operating
Systems, May 1997.
- 20
-
D. Mazieres, M. Kaminsky, M. Frans Kaashoek, and E. Witchel.
Separating key management from file system security.
In Symposium on Operating Systems Principles (SOSP), pages
124-139, December 1999.
- 21
-
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer.
Kerberos Authentication and Authorization System.
Technical report, MIT, December 1987.
- 22
-
S. Miltchev, S. Ioannidis, and A.D. Keromytis.
A Study of the Relative Costs of Network Security Protocols.
In Proceedings of the Annual USENIX Technical Conference,
FREENIX Track, pages 41-48, June 2001.
- 23
-
K. Petersen, M. Spreitzer, D. Terry, and M. Theimer.
Bayou: Replicated Database Services for World-Wide Applications.
In Proceedings of the 7th ACM SIGOPS European Workshop,
1996.
- 24
-
J. Regan and C. Jensen.
Capability File Names: Separating Authorization from User Management
in an Internet File System.
In Proceedings of the USENIX Security Symposium, pages
211-233, August 2001.
- 25
-
E. Riedel, M. Kallahalla, and R. Swaminathan.
A framework for evaluating storage system security.
In Proceedings of the 1st Conference on File and Storage
Technologies (FAST), January 2002.
- 26
-
M. A. Rosenstein, D. E. Geer Jr., and P. J. Levine.
The Athena Service Management System.
In Proceedings of the Winter USENIX Conference, pages 203-212,
1988.
- 27
-
R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon.
Design and Implementation of the Sun Network File System.
In Proceedings of the Summer USENIX Conference, June 1985.
- 28
-
D.B. Terry, M.M. Theimer, K. Petersen, A.J. Demers, M.J. Spreitzer, and C.H.
Hauser.
Managing Update Conflicts in Bayou, a Weakly Connected Storage
System.
In Proceedings of the 15th ACM Symposium on Operating Systems
Principles (SOSP), December 1995.
- 29
-
A. Vahdat.
Operating System Services for Wide-Area Applications.
PhD thesis, UC Berkeley, December 1998.
- 30
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson.
Authentication in the Taos Operating System.
ACM Transactions on Computer Systems, 12(1):3-32, 1994.
Stefan Miltchev
4/8/2003