Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Secure and Flexible Global Previous: Conclusions

References

1
Bonnie Filesystem Performance Benchmark.
https://www.textuality.com/bonnie/.

2
PostMark Filesystem Performance Benchmark.
https://www.netapp.com/tech_library/3022.html.

3
Eshwar Belani, Amin Vahdat, Thomas Anderson, and Michael Dahlin.
The CRISIS Wide Area Security Architecture.
In Proceedings of the USENIX Security Symposium, pages 15-30, August 1998.

4
M. Blaze.
A Cryptographic File System for Unix.
In Proceedings of the 1st ACM Conference on Computer and Communications Security, November 1993.

5
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis.
The KeyNote Trust Management System Version 2.
RFC 2704, September 1999.

6
M. Blaze, J. Feigenbaum, and J. Lacy.
Decentralized Trust Management.
In Proceedings of the 17th Symposium on Security and Privacy, pages 164-173, 1996.

7
CCITT.
X.509: The Directory Authentication Framework.
International Telecommunications Union, 1989.

8
S. P. Dyer.
The Hesiod Name Server.
In Proceedings of the USENIX Winter Technical Conference, pages 183-190, 1988.

9
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen.
SPKI Certificate Theory.
RFC (Proposed Standard) 2693, Internet Engineering Task Force, September 1999.

10
J. Satran et al.
IPS Internet Draft - iSCSI.
Internet Draft, Internet Engineering Task Force, Septermber 2001.

11
K. Fu, E. Sit, and N. Faemster.
Dos and Don'ts of Client Authentication on the Web.
In Proceedings of the USENIX Security Symposium, pages 251-269, August 2001.

12
C.A. Gunter and T. Jim.
Policy-directed certificate retrieval.
SP&E, 30(15):1609-1640, 2000.

13
D. Harkins and D. Carrel.
The Internet Key Exchange (IKE).
RFC (Proposed Standard) 2409, Internet Engineering Task Force, November 1998.

14
J.H. Howard, M.L. Kazar, S.G. Menees, D.A. Nichols, M. Satyanarayanan, R.N. Sidebotham, and M.J. West.
Scale and Performance in a Distributed File System.
ACM Transactions on Computer Systems, 6(1):51-81, February 1988.

15
J. Schönwälder and H. Langendörfer.
Administration of large distributed UNIX LANs with BONES.
In Proceedings of the World Conference On Tools and Techniques for System Administration, Networking, and Security, April 1993.

16
S. Kent and R. Atkinson.
Security Architecture for the Internet Protocol.
RFC (Proposed Standard) 2401, Internet Engineering Task Force, November 1998.

17
A. D. Keromytis.
STRONGMAN: A Scalable Solution to Trust Management in Networks.
PhD thesis, University of Pennsylvania, December 2001.

18
J. Linn.
Generic Security Service Application Program Interface, Version 2.
RFC (Proposed Standard) 2078, Internet Engineering Task Force, January 1997.

19
D. Mazieres and M.F. Kaashoek.
Secure Applications Need Flexible Operating Systems.
In Proceedings of the 6th Workshop on Hot Topics in Operating Systems, May 1997.

20
D. Mazieres, M. Kaminsky, M. Frans Kaashoek, and E. Witchel.
Separating key management from file system security.
In Symposium on Operating Systems Principles (SOSP), pages 124-139, December 1999.

21
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer.
Kerberos Authentication and Authorization System.
Technical report, MIT, December 1987.

22
S. Miltchev, S. Ioannidis, and A.D. Keromytis.
A Study of the Relative Costs of Network Security Protocols.
In Proceedings of the Annual USENIX Technical Conference, FREENIX Track, pages 41-48, June 2001.

23
K. Petersen, M. Spreitzer, D. Terry, and M. Theimer.
Bayou: Replicated Database Services for World-Wide Applications.
In Proceedings of the 7th ACM SIGOPS European Workshop, 1996.

24
J. Regan and C. Jensen.
Capability File Names: Separating Authorization from User Management in an Internet File System.
In Proceedings of the USENIX Security Symposium, pages 211-233, August 2001.

25
E. Riedel, M. Kallahalla, and R. Swaminathan.
A framework for evaluating storage system security.
In Proceedings of the 1st Conference on File and Storage Technologies (FAST), January 2002.

26
M. A. Rosenstein, D. E. Geer Jr., and P. J. Levine.
The Athena Service Management System.
In Proceedings of the Winter USENIX Conference, pages 203-212, 1988.

27
R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon.
Design and Implementation of the Sun Network File System.
In Proceedings of the Summer USENIX Conference, June 1985.

28
D.B. Terry, M.M. Theimer, K. Petersen, A.J. Demers, M.J. Spreitzer, and C.H. Hauser.
Managing Update Conflicts in Bayou, a Weakly Connected Storage System.
In Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP), December 1995.

29
A. Vahdat.
Operating System Services for Wide-Area Applications.
PhD thesis, UC Berkeley, December 1998.

30
E. Wobber, M. Abadi, M. Burrows, and B. Lampson.
Authentication in the Taos Operating System.
ACM Transactions on Computer Systems, 12(1):3-32, 1994.



Stefan Miltchev
4/8/2003