Protecting File Systems with Transient Authentication
dc.contributor.author | Corner, Mark D. | en_US |
dc.date.accessioned | 2006-09-08T19:10:31Z | |
dc.date.available | 2006-09-08T19:10:31Z | |
dc.date.issued | 2005-01 | en_US |
dc.identifier.citation | Corner, Mark D.; (2005). "Protecting File Systems with Transient Authentication." Wireless Networks 11 (1-2): 7-19. <http://hdl.handle.net/2027.42/41362> | en_US |
dc.identifier.issn | 1022-0038 | en_US |
dc.identifier.issn | 1572-8196 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/41362 | |
dc.description.abstract | Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully address this problem. Such systems ask the user to imbue them with long-term authority for decryption, but that authority can be used by anyone who physically possesses the machine. Forcing the user to frequently reestablish his identity is intrusive, encouraging him to disable encryption. | en_US |
dc.format.extent | 422634 bytes | |
dc.format.extent | 3115 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | text/plain | |
dc.language.iso | en_US | |
dc.publisher | Kluwer Academic Publishers; Springer Science + Business Media, Inc. | en_US |
dc.subject.other | Computer Science | en_US |
dc.subject.other | Computer Communication Networks | en_US |
dc.subject.other | Electronic and Computer Engineering | en_US |
dc.subject.other | Business Information Systems | en_US |
dc.title | Protecting File Systems with Transient Authentication | en_US |
dc.type | Article | en_US |
dc.subject.hlbsecondlevel | Information and Library Science | en_US |
dc.subject.hlbsecondlevel | Electrical Engineering | en_US |
dc.subject.hlbtoplevel | Social Sciences | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA | en_US |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/41362/1/11276_2004_Article_5384743.pdf | en_US |
dc.identifier.doi | http://dx.doi.org/10.1007/s11276-004-4743-z | en_US |
dc.identifier.source | Wireless Networks | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.