2009 IEEE International Conference on Networking, Architecture, and Storage 2009
DOI: 10.1109/nas.2009.72
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Authentication in Large-Scale Storage Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…However, the smartcard device used in large-scale systems introduces several weak points related to the distribution and the protection of keys, descriptors, and so on. Different solutions for keys management and distribution, involving decentralized CAs, have been proposed and evaluated (Michener & Acar, 2000; Nielsen & Hamilton, 2005; Niu et al , 2009).…”
Section: Authentication In Large-scale Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the smartcard device used in large-scale systems introduces several weak points related to the distribution and the protection of keys, descriptors, and so on. Different solutions for keys management and distribution, involving decentralized CAs, have been proposed and evaluated (Michener & Acar, 2000; Nielsen & Hamilton, 2005; Niu et al , 2009).…”
Section: Authentication In Large-scale Systemsmentioning
confidence: 99%
“…e-commerce or e-banking services) need a high level of security. In Niu et al (2009), an architecture for large-scale storage system implementing a decentralized authentication and authorization schema is proposed. In a decentralized security system, each user and component (e.g.…”
Section: Keys Management and Distributionmentioning
confidence: 99%
See 1 more Smart Citation