Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Block-Level Security for Network-Attached Previous: Acknowledgments

Bibliography

1
M. Bellare, R. Canetti, and H. Krawczyk.
Keying hash functions for message authentication.
Lecture Notes in CS, 1109:1-15, 1996.

2
A. D. Birrell and B. J. Nelson.
Implementing remote procedure calls.
ACM Transactions on Computer Systems, 2(1):39-59, February 1984.

3
Andrew D. Birrell.
Secure communication using remote procedure calls.
ACM Transactions on Computer Systems, 3(1):1-14, February 1985.

4
Burton Bloom.
Space/time trade-offs in hash coding with allowable errors.
Communications of ACM, 13(7):422-426, 1970.

5
W. Freeman and E. Miller.
Design for a decentralized security system for network-attached storage.
In Proceedings of the 17th IEEE Symposium on Mass Storage Systems and Technologies, pages 361-373, March 2000.

6
Eran Gabber and Abraham Silberschatz.
Agora: A minimal distributed protocol for electronic commerce.
In The Second USENIX Workshop on Electronic Commerce Proceedings, pages 223-232, 1996.

7
G. Gibson, D. Nagle, K. Amiri, F. Chang, H. Gobioff, E. Riedel, D. Rochberg, and J. Zelenka.
Filesystems for network-attached secure disks.
Technical Report CMU-CS-97-112, Carnegie Mellon, March 1997.

8
G. A. Gibson, D. F. Nagle, K. Amiri, J. Butler, Fay W. Chang, H. Gobioff, C. Hardin, E. Riedel, D. Rochberg, and J. A. Zelenka.
Cost-effective, high-bandwidth storage architecture.
In Proceedings of the 8th Conf. on Architectural Support for Programming Languages and Operating Systems, pages 92-103, October 1998.

9
Howard Gobioff.
Security for a High Performance Commodity Storage Subsystem.
PhD thesis, CMU, 1999.

10
Howard Gobioff, Garth Gibson, and Doug Tygar.
Security for network attached storage devices.
Technical Report CMU-CS-97-185, Carnegie Mellon, October 1997.

11
Kent Koeninger.
CXFS: A clustered SAN filesystem from SGI.
https://www.sgi.com/Products/PDF/2691.pdf.

12
Barbara Liskov, Liuba Shrira, and John Wroclawski.
Efficient at-most-once messages based on synchronized clocks.
ACM Transactions on Computer Systems, 9(2):125-142, May 1991.

13
D. Mazières and D. Shasha.
Don't trust your file server.
In Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), pages 99-104, May 2001.

14
M.K. McKusick, W.N. Joy, S.J. Leffler, and R.S. Fabry.
A fast file system for UNIX.
ACM Trans. on Computer Systems, 2(3):181-197, 1984.

15
Ethan L. Miller, William E. Freeman, Darrell D. E. Long, and Benjamin C. Reed.
Strong security for network-attached storage.
In Proceedings of the FAST 2002 Conference on File And Storage Technologies, pages 1-14, January 2002.

16
S. Mittra and T. Woo.
A flow-based approach to datagram security.
In Proc. ACM SIGCOMM, 1997.

17
NIST.
Secure hash algorithm, 1995.
FIPS 180-1.

18
Matthew T. O'Keefe.
Shared file systems and Fibre Channel.
In Proceedings of the Sixth NASA Goddard Conference on Mass Storage Systems, pages 1-16. IEEE Computer Society Press, 1998.

19
B. Reed, E. Chron, D. Long, and R. Burns.
Authenticating network attached storage.
IEEE Micro, 20(1), January 2000.

20
Hans Reiser.
Reiserfs v.3 whitepaper, 2000.
https://www.namesys.com/.

21
Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan.
A framework for evaluating storage system security.
In Proceedings of the 1st Conference on File and Storage Technologies (FAST), pages 15-30, January 2002.

22
R. Sandber, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon.
Design and implementation of the Sun network file system.
In Proceedings of USENIX Summer Conference, 1985.

23
Bruce Schneier.
Applied Cryptography.
John Wiley & Sons, 1996.

24
V. Srinivasan and J. C. Mogul.
Spritely NFS: Experiements with cache-consistency protocols.
In Proceedings of the Twelfth ACM Symposium on Operating Systems Principles, pages 45-57, December 1989.

25
Tivoli.
Tivoli SANergy: Helping you reach your full SAN potential.
https://www.tivoli.com/products/documents/datasheets/sanergy_ds.pdf.

26
Rodney Van Meter, Gregory Finn, and Steven Hotz.
Derived virtual devices: A secure distributed file system mechanism.
In Ben Kobler, editor, Proc. Fifth NASA Goddard Conference on Mass Storage Systems and Technologies, September 1996.



Mark Lillibridge 2003-01-06