咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 1 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 5 篇 encrypted file s...
  • 1 篇 trusted storage
  • 1 篇 lsm
  • 1 篇 symmetric encryp...
  • 1 篇 nas
  • 1 篇 linux
  • 1 篇 usage controls
  • 1 篇 kernel programmi...
  • 1 篇 opencl accelerat...
  • 1 篇 stackable file s...
  • 1 篇 uclinux
  • 1 篇 storage security
  • 1 篇 trusted platform
  • 1 篇 linux security m...
  • 1 篇 odrl
  • 1 篇 heterogeneous co...
  • 1 篇 trusted platform...
  • 1 篇 tpm
  • 1 篇 linux kernel
  • 1 篇 kernel samepage ...

机构

  • 1 篇 college of compu...
  • 1 篇 univ pittsburgh ...
  • 1 篇 university of ke...
  • 1 篇 huazhong univ sc...
  • 1 篇 natl cheng kung ...

作者

  • 1 篇 lin te-sheng
  • 1 篇 tu chia-heng
  • 1 篇 qiujie lu
  • 1 篇 sushama karumanc...
  • 1 篇 yuwei cuan
  • 1 篇 yaqiong liu
  • 1 篇 kyle david s.
  • 1 篇 xie cs
  • 1 篇 huang jz
  • 1 篇 dingrong yuan
  • 1 篇 brustoloni jose ...
  • 1 篇 cai b

语言

  • 5 篇 英文
检索条件"主题词=Encrypted File System"
5 条 记 录,以下是1-10 订阅
排序:
Research and implement of an encrypted file system used to NAS  2
Research and implement of an encrypted file system used to N...
收藏 引用
2nd IEEE International Security in Storage Workshop (SISW 2003)
作者: Huang, JZ Xie, CS Cai, B Huazhong Univ Sci & Technol Dept Comp Engn & Sci Natl Storage Syst Lab Wuhan 430074 Peoples R China
Data security has become an increasingly important factor in routine work with the development of applications, and users trend to obtain high security with maximum comfort. In this article a cryptographic file system... 详细信息
来源: 评论
The design of an encrypted file system based on improved DES algorithm
The design of an encrypted file system based on improved DES...
收藏 引用
2013 International Conference on Communication Technology (ICCT 2013)
作者: Yaqiong Liu Dingrong Yuan Yuwei Cuan Qiujie Lu College of Computer Science and Information Technology Guangxi Normal University
With the rapid development of information technology, information security has become an important topic in the present society. Data Encryption Standard(DES) algorithm has been widely used in various fields since it ... 详细信息
来源: 评论
UCLinux: a Linux Security Module for Trusted-Computing-based Usage Controls Enforcement
UCLinux: a Linux Security Module for Trusted-Computing-based...
收藏 引用
ACM Workshop on Scalable Trusted Computing
作者: Kyle, David S. Brustoloni, Jose C. Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modules (TPMs) that are built into an incr... 详细信息
来源: 评论
A TRUSTED STORAGE system FOR THE CLOUD
A TRUSTED STORAGE SYSTEM FOR THE CLOUD
收藏 引用
作者: Sushama Karumanchi University of Kentucky
学位级别:硕士
Data stored in third party storage systems like the cloud might not be secure since confidentiality and integrity of data are not guaranteed. Though cloud computing provides cost-effective storage services, it is a th... 详细信息
来源: 评论
Augmenting Operating systems with OpenCL Accelerators
收藏 引用
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC systemS 2019年 第3期24卷 30-30页
作者: Tu, Chia-Heng Lin, Te-Sheng Natl Cheng Kung Univ Dept Comp Sci & Informat Engn 1 Univ Rd Tainan 701 Taiwan
Heterogeneous computing leverages more than one kind of processors to boost the performance of user-space applications with the heterogeneous programming languages, e.g., OpenCL. While some works have been done to acc... 详细信息
来源: 评论