The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery to bear on remote data disaster, and understanding this proceeding. We describe ARRAY, a system architecture for data disaster recovery that combines reliability, storage space, and security...
As authentication provides crucial online identity, it is the basis of data security. In this paper, a session based authentication is proposed and the long unique un-guessable session identifier is used as a parameter of an authentication token. It has the advantages of one-timeness, short-lived and no prior knowledge requirement. The session model is established with detailed implementation of communication...
Since storage systems can see changes to persistent data on them, some types of intrusions can be detected by storage systems. Storage-based intrusion detection system (SIDS) has become a valuable tool in monitoring for the intrusion. However, the traditional storage device works on the block-level while intrusion always happens on the file-level, this gap has to be erased by detection software, which...
As credential-based scheme has several advantages and there is an increased need for more automated security in pervasive environments, dynamic security policy for credential-based systems is an effective approach. In this paper, some dynamic security policies for credential-based storage systems are proposed. They are dynamic role based access control policy, dynamic object based access control policy,...
As the object-based storage device (OSD) protocol emerges as the next generation storage technology, its security has received a great deal of attentions. Object-based storage security mechanism is credential-based. It doesn't consider intrusion threat. Since OSD can observe all the changes to the object data and attributes, it can spot several types of intrusion. In this paper, we study how intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.