SC-CFS: Smarcard Secured Cryptographic File System
dc.contributor.author | Itoi, Naomaru | en_US |
dc.date.accessioned | 2014-07-18T18:11:50Z | |
dc.date.available | 2014-07-18T18:11:50Z | |
dc.date.issued | 2001-01-16 | en_US |
dc.identifier.citation | Naomaru Itoi, "SC-CFS: Smartcard Secured Cryptographic File System," February 2001. [USENIX Security Symposium, Washington, D.C. (August 2001)] <http://hdl.handle.net/2027.42/107892> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107892 | |
dc.description.abstract | Although storing information securely is one of the most important roles expected for computer systems, it is difficult to achieve with current commodity computers. The computers may yield secrets through physical breach, software bug exploitation, or password guessing attack. Even file systems that provide strong security, such as the cryptographic file system, are not perfect against these attacks. We have developed SC-CFS, a file system that encrypts files and takes advantage of a smart card for per-file key generation. SC-CFS counters password guessing attack, and minimizes the damage caused by physical attack and bug exploitation. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | SC-CFS: Smarcard Secured Cryptographic File System | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107892/1/citi-tr-01-6.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.