Show simple item record

Protecting File Systems with Transient Authentication

dc.contributor.authorCorner, Mark D.en_US
dc.date.accessioned2006-09-08T19:10:31Z
dc.date.available2006-09-08T19:10:31Z
dc.date.issued2005-01en_US
dc.identifier.citationCorner, Mark D.; (2005). "Protecting File Systems with Transient Authentication." Wireless Networks 11 (1-2): 7-19. <http://hdl.handle.net/2027.42/41362>en_US
dc.identifier.issn1022-0038en_US
dc.identifier.issn1572-8196en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/41362
dc.description.abstractLaptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully address this problem. Such systems ask the user to imbue them with long-term authority for decryption, but that authority can be used by anyone who physically possesses the machine. Forcing the user to frequently reestablish his identity is intrusive, encouraging him to disable encryption.en_US
dc.format.extent422634 bytes
dc.format.extent3115 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.language.isoen_US
dc.publisherKluwer Academic Publishers; Springer Science + Business Media, Inc.en_US
dc.subject.otherComputer Scienceen_US
dc.subject.otherComputer Communication Networksen_US
dc.subject.otherElectronic and Computer Engineeringen_US
dc.subject.otherBusiness Information Systemsen_US
dc.titleProtecting File Systems with Transient Authenticationen_US
dc.typeArticleen_US
dc.subject.hlbsecondlevelInformation and Library Scienceen_US
dc.subject.hlbsecondlevelElectrical Engineeringen_US
dc.subject.hlbtoplevelSocial Sciencesen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumDepartment of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USAen_US
dc.contributor.affiliationumcampusAnn Arboren_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/41362/1/11276_2004_Article_5384743.pdfen_US
dc.identifier.doihttp://dx.doi.org/10.1007/s11276-004-4743-zen_US
dc.identifier.sourceWireless Networksen_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.