Second IEEE International Security in Storage Workshop
DOI: 10.1109/sisw.2003.10000
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Authentication Mechanisms for Object-based Storage Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…There have been numerous efforts to secure parallel and distributed storage systems [7][8][9][10][11][12][13]16], most of which are based on capabilities. A fine-grained capability [7,9] may authorize access privileges at the granularity of a block or object.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been numerous efforts to secure parallel and distributed storage systems [7][8][9][10][11][12][13]16], most of which are based on capabilities. A fine-grained capability [7,9] may authorize access privileges at the granularity of a block or object.…”
Section: Related Workmentioning
confidence: 99%
“…Kher and Kim [16] use role-based access control (RBAC) in their system. They store role-based access control lists with each object on object-based storage devices.…”
Section: Related Workmentioning
confidence: 99%
“…The granularity of disk reads and writes ranges from disk blocks [26,33] to more sophisticated constructs such as objects [17,29]. Regardless of access granularity, these simple read/write interfaces are not adequate for lowlocality update-intensive workloads for two reasons.…”
mentioning
confidence: 99%