CRYPTOGRAPHIC FILE STORAGE.

被引:0
|
作者
King, David [1 ]
机构
[1] ICL Defence Systems, Winnersh, Engl, ICL Defence Systems, Winnersh, Engl
来源
ICL technical journal | 1987年 / 5卷 / 04期
关键词
COMPUTER NETWORKS - Local Networks - COMPUTER SYSTEMS; DIGITAL - Distributed - DATA PROCESSING - Security of Data;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of this paper is that it describes a cryptographic system that has been built. It is based on work by Gifford although it derives its architecture from DSS (Distributed Secure System). The architecture is LAN-based and comprises amongst other things a file server and a key server. The files are stored in 'post-box' fashion and integral use is made of public key encryption to govern read and write controls. Keys are categorised as either subject or object keys and are stored in key envelopes on the key server. Methods of controlling access to keys are based upon Gifford's sealing primitives. Keys are placed on a key server via a compilation process whose source is a specification of protection in a language called PROSP. The procedure is illustrated in an example and the file access procedure comprises a sequence of requests and replies between both servers, the special interface to the network and the workstation.
引用
收藏
页码:699 / 709
相关论文
共 50 条
  • [1] MAGNETIC DISKS FOR LARGE FILE STORAGE.
    Falk, Howard
    Electronic Library, 1986, 4 (05): : 264 - 270
  • [2] FILE PLACEMENT IN DIRECT-ACCESS STORAGE.
    Trifonov, Yu.V.
    Automatic Control and Computer Sciences, 1978, 12 (03) : 61 - 65
  • [3] Cloud Storage Cost Modeling for Cryptographic File Systems
    Storch, Mauro
    De Rose, Cesar A. F.
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 9 - 14
  • [4] Integrity checking in cryptographic file systems with constant trusted storage
    Oprea, Alina
    Reiter, Michael K.
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 183 - +
  • [5] A Hybrid Cryptographic Technique for File Storage Mechanism Over Cloud
    Sharma, Shivam
    Singla, Kanav
    Rathee, Geetanjali
    Saini, Hemraj
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 241 - 256
  • [6] Extending DIRAC File Management with Erasure-Coding for efficient storage.
    Skipsey, Samuel Cadellin
    Todev, Paulin
    Britton, David
    Crooks, David
    Roy, Gareth
    21ST INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP2015), PARTS 1-9, 2015, 664
  • [7] Storage.
    Mulac, CM
    REFERENCE & USER SERVICES QUARTERLY, 1997, 37 (02) : 227 - 228
  • [8] Self storage.
    Ford, Amy
    LIBRARY JOURNAL, 2006, 131 (17) : 50 - 50
  • [9] Comment of Secure File Storage and Retrieval in Cloud Based on MRSA Cryptographic Algorithm
    Zhong, Zhengrun
    Liu, Hongxuan
    Chen, Sonia C-, I
    Liu, Chenglian
    Gardner, Donald
    2020 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT (ICITM 2020), 2020, : 261 - 264
  • [10] UNDERGROUND STORAGE.
    Trotter, John G.
    Pachet, Michel
    Petroleum Review, 1974, 28 (335): : 727 - 732