2005 International Conference on Cyberworlds (CW'05) 2005
DOI: 10.1109/cw.2005.1
|View full text |Cite
|
Sign up to set email alerts
|

A capability-based transparent cryptographic file system

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
(11 reference statements)
0
1
0
Order By: Relevance
“…Cryptographic file systems (e.g., [5,7,11,19]) and their implementations (e.g., [1,2]) have been studied extensively in the last two decades . A cryptographic file system complements the access control mechanism of the operating system (OS).…”
Section: Related Workmentioning
confidence: 99%
“…Cryptographic file systems (e.g., [5,7,11,19]) and their implementations (e.g., [1,2]) have been studied extensively in the last two decades . A cryptographic file system complements the access control mechanism of the operating system (OS).…”
Section: Related Workmentioning
confidence: 99%