Integration of a cryptographic file system and access control

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The importance of kernel-level security mechanisms such as a file system and access control has been increasingly emphasized as weaknesses in user-level applications. However, when using only access control, including role-based access control (RBAC), a system is vulnerable to a low-level or physical attack. In addition, when using only a cryptographic file system, a system also has a weakness that it is unable to protect itself. To overcome these vulnerabilities, we integrated a cryptographic file system into the' access control, and developed a prototype. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Kim, S. K., Park, W. J., Kim, S. K., Ahn, S. I., & Han, S. Y. (2006). Integration of a cryptographic file system and access control. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3917 LNCS, pp. 139–151). Springer Verlag. https://doi.org/10.1007/11734628_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free