The importance of kernel-level security mechanisms such as a file system and access control has been increasingly emphasized as weaknesses in user-level applications. However, when using only access control, including role-based access control (RBAC), a system is vulnerable to a low-level or physical attack. In addition, when using only a cryptographic file system, a system also has a weakness that it is unable to protect itself. To overcome these vulnerabilities, we integrated a cryptographic file system into the' access control, and developed a prototype. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Kim, S. K., Park, W. J., Kim, S. K., Ahn, S. I., & Han, S. Y. (2006). Integration of a cryptographic file system and access control. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3917 LNCS, pp. 139–151). Springer Verlag. https://doi.org/10.1007/11734628_17
Mendeley helps you to discover research relevant for your work.