... of this encryption system are compared with Windows Encrypting File System(EFS).
Tópico(s): Embedded
2009 - East China Computer Technology Research Institute | Jisuanji gongcheng
... File System (NTFS) file system, the so-called encrypting file system (EFS). EFS files can be manipulated transparently by ... the capture and analysis of physical memory. KEYWORDS: encrypting file systems EFSlive system forensic analysisfile systems security
Tópico(s): Advanced Malware Detection Techniques
2008 - Taylor & Francis | Journal of Digital Forensic Practice
To solve the problem of file encryption storage in Windows system, the system's lack of Windows EFS is analyzed. In-depth studied key technologies used on development of a file system filter driver, including data processing of I/O request packet in the filter driver, tracing file statues, avoid the system re-entry. Using the teelmology of file system filter driver, a new enerypting file system is designed and implemented. The system is completely transparent to the users. It encrypt specified files, ...
Tópico(s): Embedded
2009 - China Aerospace Science and Industry Group | Jisuanji gongcheng yu sheji
... Opt-in Cross-site scripting protection Phishing filter Encrypting File System (EFS) Device Control BitLocker Drive Encryption Rights Management ...
Tópico(s): Mobile and Web Applications
2007 - Elsevier BV | Computer Fraud & Security
Umashankar Rawat, Shishir Kumar,
Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner.Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2012 - | International Journal of Computer Network and Information Security
... their materials and communications. Windows, instance, has an Encrypting File System that can be used to store information in ...
Tópico(s): Legal Rights and Human Rights
2015 - Wiley | Harvard journal of law & public policy/Harvard journal of law and public policy
The problem of ensuring recoverability of encrypting data in a file storage system is examined. In this situation, the original data (plaintext) are removed from the system after encryption. In the event of errors either ...
Tópico(s): Radiation Effects in Electronics
1990 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Theory
Timothy R. McIntosh, Julian Jang‐Jaccard, Paul Watters,
... malicious ransomware behaviors. Such behaviors include crypto-ransomware file system attacks achieved by either encrypting individual files or modifying the Master Boot Record (MBR). Our ...
Tópico(s): Digital and Cyber Forensics
2018 - Springer Science+Business Media | Lecture notes in computer science
Li Yang, Teng Wei, Fengwei Zhang, Jianfeng Ma,
... proposed, independent of the characteristics of the underlying file system and storage medium. The approach encrypting every file on an insecure medium with a unique key ...
Tópico(s): Digital and Cyber Forensics
2018 - Elsevier BV | Computers & Security
Christos Volos, I. Μ. Kyprianidis, I. N. Stouboulos,
... on a Logistic map, is presented.The proposed system is used for encrypting text files for the purpose of creating secure data bases. ...
Tópico(s): Algorithms and Data Compression
2013 - Eastern Macedonia and Thrace Institute of Technology | Journal of Engineering Science and Technology Review
... most efficient encryption algorithm to be selected when encrypting text, audio, and video files. In this system, the user is presented with three profiles as “ ...
Tópico(s): User Authentication and Security
2020 - Springer Nature | SN Applied Sciences
Dian Rachmawati, Amer Sharif, Jaysilen, Mohammad Andri Budiman,
... algorithm is used as an asymmetric algorithm. The system is tested by encrypting and decrypting the file by using TEA algorithm and using LUC algorithm ...
Tópico(s): Chaos-based Image/Signal Encryption
2018 - IOP Publishing | IOP Conference Series Materials Science and Engineering
... caused by WannaCry.The malware hit Microsoft Windows systems, encrypting infected computer files and then asking for a ransom to decrypt them.This time your philosopher was safe, probably because he uses Apple systems.It is estimated that, at that date, WannaCry ...
Tópico(s): Big Data and Business Intelligence
2017 - Springer Nature (Netherlands) | Philosophy & Technology
Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha, Mohammad Dabbagh,
... features such as polymorphic, environment mapping, and partially encrypting files or saturating the system with low entropy file write operations in order ...
Tópico(s): Anomaly Detection Techniques and Applications
2020 - Springer Nature | Advances in intelligent systems and computing
... techniques. In this paper a novel approach for encrypting file system using Rbits cipher with PKC is proposed. In ...
Tópico(s): Security and Verification in Computing
2019 - | International Journal of Recent Technology and Engineering (IJRTE)
A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi,
... State of Art's solution. The proposed EEHEE system is 11% faster in encrypting data file and reduces the energy consumption by 34 % compared to the current best solution. The proposed system concentrates on reducing the energy consumption in WBAN ...
Tópico(s): Advanced Authentication Protocols Security
2022 - Iran University of Science and Technology | International Journal of Communication Networks and Information Security (IJCNIS)
İbrahim Ethem Bağcı, Shahid Raza, Utz Roedig, Thiemo Voigt,
... us to transmit requested data directly from the file system without decrypting read data blocks and then re‐encrypting these for transmission. Thus, Fusion provides benefits in ...
Tópico(s): Cryptography and Data Security
2015 - Hindawi Publishing Corporation | Security and Communication Networks
Shahab Wahhab Kareem, Raghad Zuhair Yousif, Shadan Mohammed Jihad Abdalwahid,
... in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in ...
Tópico(s): Cryptography and Data Security
2020 - Institute of Advanced Engineering and Science (IAES) | Indonesian Journal of Electrical Engineering and Computer Science
Shadan Mohammed Jihad Abdalwahid, Raghad Zuhair Yousif, Shahab Wahhab Kareem,
... in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in ...
Tópico(s): Chaos-based Image/Signal Encryption
2019 - Polish Association for Knowledge Promotion | Applied Computer Science
... around 2012. The idea of ransomware attacks is, encrypting and locking the files on a computer until the ransom is paid. These attacks usually enter the system by using Trojans, which has malicious programs that ...
Tópico(s): Network Security and Intrusion Detection
2018 - Springer Nature | Advances in intelligent systems and computing
... interface for configuring and analyzing system security policy. ⊎ Encrypting File System — implements a further layer of services on top ...
Tópico(s): Mobile Agent-Based Network Management
1998 - Elsevier BV | Information Security Technical Report
Zhenliu Zhou, Tian Ling, Zhuoling Li,
... are required in personal application environment. Limitations about encrypting file system, virtual disk encryption and filtrating driver encryption, are ... smart u-key, is put forward and implemented. File's encrypting procedure in this system is transparent, self-determination and visible, and the whole system is convenient to migrate. Mow word and excel files can be encrypted using this system.
Tópico(s): Digital Rights Management and Security
2011 - Elsevier BV | Procedia Engineering
Zakaria Igarramen, Mustapha Hedabou,
... storage, upon revocations of file access policies, by encrypting all data files before outsourcing, and then using a trusted third party to outsource the cryptographic keys. Unfortunately, this system remains weak since its security relies entirely on ...
Tópico(s): Cryptography and Data Security
2018 - Springer International Publishing | Lecture notes in networks and systems
Qingzhi Liu, Yuchen Huang, Chenglu Jin, Xiaohan Zhou, Ying Mao, Cagatay Catal, Long Cheng,
... further data analytical tasks of data users, while encrypting the data according to the requirements of data owners. We implement our solution with smart contracts, distributed file systems, and ML models. The experimental results show that ...
Tópico(s): Privacy, Security, and Data Protection
2024 - Association for Computing Machinery | ACM Transactions on Multimedia Computing Communications and Applications
Umashankar Rawat, Shishir Kumar,
... Linux (ECFS) in kernel-space. It uses stackable file system interface to introduce a layer for encrypting files using symmetric keys, and public-key cryptography for user authentication and file sharing, like other existing enterprise-class cryptographic file systems. It differs itself from existing systems by including ...
Tópico(s): Parallel Computing and Optimization Techniques
2012 - Taylor & Francis | International Journal of Information Security and Privacy
A. Basnet, Abeer Alsadoon, P. W. C. Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi,
... State of Art's solution. The proposed EEHEE system is 11% faster in encrypting data file and reduces the energy consumption by 34 % compared to the current best solution. The proposed system concentrates on reducing the energy consumption in WBAN ...
Tópico(s): Wireless Communication Security Techniques
2019 - Iran University of Science and Technology | International Journal of Communication Networks and Information Security (IJCNIS)
Simon Petravick, Stephen G. Kerr,
... Pro; and Windows 2000 can use Microsoft's Encrypting File System (EFS) to encrypt files or folders they choose. ...
Tópico(s): Advanced Data Storage Technologies
2009 - American Institute of Certified Public Accountants | Journal of accountancy online/Journal of accountancy
Adam Barth, Dan Boneh, Brent Waters,
... these users. We discover that current systems for encrypting content to sets of users are subject to attacks on user privacy. We propose a new mechanism, private broadcast encryption, to protect the privacy of users of encrypted file systems and content delivery systems. We construct a private ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2006 - Springer Science+Business Media | Lecture notes in computer science
... throughput, encryption, and decryption time compared to existing Encrypting File System standard algorithm (EFSSA).
Tópico(s): Machine Learning and Data Classification
2023 - Springer Science+Business Media | Lecture notes in electrical engineering
... of data. In this talk, we present an encrypting file system based on GNU/Linux based servers which can ...
Tópico(s): Security and Verification in Computing
2012 - Springer Science+Business Media | IFIP advances in information and communication technology