Abstract is missing.
- Lazy Revocation in Cryptographic File SystemsMichael Backes, Christian Cachin, Alina Oprea. 1-11 [doi]
- POTSHARDS : Storing Data for the Long-term Without EncryptionKevin M. Greenan, Mark W. Storer, Ethan L. Miller, Carlos Maltzahn. 12-20 [doi]
- Towards Protecting Sensitive Files in a Compromised SystemXin Zhao, Kevin Borders, Atul Prakash. 21-28 [doi]
- The OSD Security ProtocolMichael Factor, David Nagle, Dalit Naor, Erik Riedel, Julian Satran. 29-39 [doi]
- Efficiently Binding Data to Owners in Distributed Content-Addressable Storage SystemsPatrick R. Eaton, Hakim Weatherspoon, John Kubiatowicz. 40-51 [doi]
- Maintaining Object Ordering in a Shared P2P Storage EnvironmentGermano Caronni, Raphael Rom, Glenn Scott. 52-62 [doi]
- Adding Secure Deletion to Your Favorite File SystemNikolai Joukov, Erez Zadok. 63-70 [doi]
- The Consequences of Decentralized Security in a Cooperative Storage SystemDouglas Thain, Christopher Moretti, Paul Madrid, Philip Snowberger, Jeffrey Hemmes. 71-82 [doi]
- File System Design with Assured DeleteRadia J. Perlman. 83-88 [doi]
- Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM)David A. McGrew. 89-94 [doi]
- Optimization of Covert Channel IdentificationJianjun Shen, Sihan Qing, Qingni Shen, LiPing Li. 95-108 [doi]