Limpar
298 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Revisado por pares

Jiajie Chen,

... of this encryption system are compared with Windows Encrypting File System(EFS).

Tópico(s): Embedded

2009 - East China Computer Technology Research Institute | Jisuanji gongcheng

Artigo Revisado por pares

Ewa Huebner, Derek Bem,

... File System (NTFS) file system, the so-called encrypting file system (EFS). EFS files can be manipulated transparently by ... the capture and analysis of physical memory. KEYWORDS: encrypting file systems EFSlive system forensic analysisfile systems security

Tópico(s): Advanced Malware Detection Techniques

2008 - Taylor & Francis | Journal of Digital Forensic Practice

Artigo Revisado por pares

GU Zheng-yi, Hao Huang,

To solve the problem of file encryption storage in Windows system, the system's lack of Windows EFS is analyzed. In-depth studied key technologies used on development of a file system filter driver, including data processing of I/O request packet in the filter driver, tracing file statues, avoid the system re-entry. Using the teelmology of file system filter driver, a new enerypting file system is designed and implemented. The system is completely transparent to the users. It encrypt specified files, ...

Tópico(s): Embedded

2009 - China Aerospace Science and Industry Group | Jisuanji gongcheng yu sheji

Artigo Revisado por pares

Edward Ray, E Schultz,

... Opt-in Cross-site scripting protection Phishing filter Encrypting File System (EFS) Device Control BitLocker Drive Encryption Rights Management ...

Tópico(s): Mobile and Web Applications

2007 - Elsevier BV | Computer Fraud & Security

Artigo Acesso aberto

Umashankar Rawat, Shishir Kumar,

Linux systems use Encrypting File System (EFS) for providing confidentiality and integrity services to files stored on disk in a secure, efficient and transparent manner.Distributed encrypting file system should also provide support for secure remote access, multiuser file sharing, possible use by non-privileged users, portability, incremental ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2012 - | International Journal of Computer Network and Information Security

Artigo Revisado por pares

Laura K. Donohue,

... their materials and communications. Windows, instance, has an Encrypting File System that can be used to store information in ...

Tópico(s): Legal Rights and Human Rights

2015 - Wiley | Harvard journal of law & public policy/Harvard journal of law and public policy

Artigo Revisado por pares

Gordon B. Agnew,

The problem of ensuring recoverability of encrypting data in a file storage system is examined. In this situation, the original data (plaintext) are removed from the system after encryption. In the event of errors either ...

Tópico(s): Radiation Effects in Electronics

1990 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Theory

Capítulo de livro Revisado por pares

Timothy R. McIntosh, Julian Jang‐Jaccard, Paul Watters,

... malicious ransomware behaviors. Such behaviors include crypto-ransomware file system attacks achieved by either encrypting individual files or modifying the Master Boot Record (MBR). Our ...

Tópico(s): Digital and Cyber Forensics

2018 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Li Yang, Teng Wei, Fengwei Zhang, Jianfeng Ma,

... proposed, independent of the characteristics of the underlying file system and storage medium. The approach encrypting every file on an insecure medium with a unique key ...

Tópico(s): Digital and Cyber Forensics

2018 - Elsevier BV | Computers & Security

Artigo Acesso aberto Revisado por pares

Christos Volos, I. Μ. Kyprianidis, I. N. Stouboulos,

... on a Logistic map, is presented.The proposed system is used for encrypting text files for the purpose of creating secure data bases. ...

Tópico(s): Algorithms and Data Compression

2013 - Eastern Macedonia and Thrace Institute of Technology | Journal of Engineering Science and Technology Review

Artigo Acesso aberto Revisado por pares

Serkan Ballı, Menduh Yilmaz,

... most efficient encryption algorithm to be selected when encrypting text, audio, and video files. In this system, the user is presented with three profiles as “ ...

Tópico(s): User Authentication and Security

2020 - Springer Nature | SN Applied Sciences

Artigo Acesso aberto Revisado por pares

Dian Rachmawati, Amer Sharif, Jaysilen, Mohammad Andri Budiman,

... algorithm is used as an asymmetric algorithm. The system is tested by encrypting and decrypting the file by using TEA algorithm and using LUC algorithm ...

Tópico(s): Chaos-based Image/Signal Encryption

2018 - IOP Publishing | IOP Conference Series Materials Science and Engineering

Artigo Acesso aberto Revisado por pares

Luciano Floridi,

... caused by WannaCry.The malware hit Microsoft Windows systems, encrypting infected computer files and then asking for a ransom to decrypt them.This time your philosopher was safe, probably because he uses Apple systems.It is estimated that, at that date, WannaCry ...

Tópico(s): Big Data and Business Intelligence

2017 - Springer Nature (Netherlands) | Philosophy & Technology

Capítulo de livro

Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha, Mohammad Dabbagh,

... features such as polymorphic, environment mapping, and partially encrypting files or saturating the system with low entropy file write operations in order ...

Tópico(s): Anomaly Detection Techniques and Applications

2020 - Springer Nature | Advances in intelligent systems and computing

Artigo Acesso aberto

... techniques. In this paper a novel approach for encrypting file system using Rbits cipher with PKC is proposed. In ...

Tópico(s): Security and Verification in Computing

2019 - | International Journal of Recent Technology and Engineering (IJRTE)

Artigo Acesso aberto Revisado por pares

A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi,

... State of Art's solution. The proposed EEHEE system is 11% faster in encrypting data file and reduces the energy consumption by 34 % compared to the current best solution. The proposed system concentrates on reducing the energy consumption in WBAN ...

Tópico(s): Advanced Authentication Protocols Security

2022 - Iran University of Science and Technology | International Journal of Communication Networks and Information Security (IJCNIS)

Artigo Revisado por pares

İbrahim Ethem Bağcı, Shahid Raza, Utz Roedig, Thiemo Voigt,

... us to transmit requested data directly from the file system without decrypting read data blocks and then re‐encrypting these for transmission. Thus, Fusion provides benefits in ...

Tópico(s): Cryptography and Data Security

2015 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto

Shahab Wahhab Kareem, Raghad Zuhair Yousif, Shadan Mohammed Jihad Abdalwahid,

... in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in ...

Tópico(s): Cryptography and Data Security

2020 - Institute of Advanced Engineering and Science (IAES) | Indonesian Journal of Electrical Engineering and Computer Science

Artigo Acesso aberto Revisado por pares

Shadan Mohammed Jihad Abdalwahid, Raghad Zuhair Yousif, Shahab Wahhab Kareem,

... in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in ...

Tópico(s): Chaos-based Image/Signal Encryption

2019 - Polish Association for Knowledge Promotion | Applied Computer Science

Capítulo de livro

Sharifah Yaqoub Fayi,

... around 2012. The idea of ransomware attacks is, encrypting and locking the files on a computer until the ransom is paid. These attacks usually enter the system by using Trojans, which has malicious programs that ...

Tópico(s): Network Security and Intrusion Detection

2018 - Springer Nature | Advances in intelligent systems and computing

Artigo

Glenn Pittaway,

... interface for configuring and analyzing system security policy. ⊎ Encrypting File System — implements a further layer of services on top ...

Tópico(s): Mobile Agent-Based Network Management

1998 - Elsevier BV | Information Security Technical Report

Artigo Acesso aberto Revisado por pares

Zhenliu Zhou, Tian Ling, Zhuoling Li,

... are required in personal application environment. Limitations about encrypting file system, virtual disk encryption and filtrating driver encryption, are ... smart u-key, is put forward and implemented. File's encrypting procedure in this system is transparent, self-determination and visible, and the whole system is convenient to migrate. Mow word and excel files can be encrypted using this system.

Tópico(s): Digital Rights Management and Security

2011 - Elsevier BV | Procedia Engineering

Capítulo de livro

Zakaria Igarramen, Mustapha Hedabou,

... storage, upon revocations of file access policies, by encrypting all data files before outsourcing, and then using a trusted third party to outsource the cryptographic keys. Unfortunately, this system remains weak since its security relies entirely on ...

Tópico(s): Cryptography and Data Security

2018 - Springer International Publishing | Lecture notes in networks and systems

Artigo Acesso aberto Revisado por pares

Qingzhi Liu, Yuchen Huang, Chenglu Jin, Xiaohan Zhou, Ying Mao, Cagatay Catal, Long Cheng,

... further data analytical tasks of data users, while encrypting the data according to the requirements of data owners. We implement our solution with smart contracts, distributed file systems, and ML models. The experimental results show that ...

Tópico(s): Privacy, Security, and Data Protection

2024 - Association for Computing Machinery | ACM Transactions on Multimedia Computing Communications and Applications

Artigo Revisado por pares
25. ECFS

Umashankar Rawat, Shishir Kumar,

... Linux (ECFS) in kernel-space. It uses stackable file system interface to introduce a layer for encrypting files using symmetric keys, and public-key cryptography for user authentication and file sharing, like other existing enterprise-class cryptographic file systems. It differs itself from existing systems by including ...

Tópico(s): Parallel Computing and Optimization Techniques

2012 - Taylor & Francis | International Journal of Information Security and Privacy

Artigo Revisado por pares

A. Basnet, Abeer Alsadoon, P. W. C. Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi,

... State of Art's solution. The proposed EEHEE system is 11% faster in encrypting data file and reduces the energy consumption by 34 % compared to the current best solution. The proposed system concentrates on reducing the energy consumption in WBAN ...

Tópico(s): Wireless Communication Security Techniques

2019 - Iran University of Science and Technology | International Journal of Communication Networks and Information Security (IJCNIS)

Artigo

Simon Petravick, Stephen G. Kerr,

... Pro; and Windows 2000 can use Microsoft's Encrypting File System (EFS) to encrypt files or folders they choose. ...

Tópico(s): Advanced Data Storage Technologies

2009 - American Institute of Certified Public Accountants | Journal of accountancy online/Journal of accountancy

Capítulo de livro Revisado por pares

Adam Barth, Dan Boneh, Brent Waters,

... these users. We discover that current systems for encrypting content to sets of users are subject to attacks on user privacy. We propose a new mechanism, private broadcast encryption, to protect the privacy of users of encrypted file systems and content delivery systems. We construct a private ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2006 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

S. Castro, R. Pushpalakshmi,

... throughput, encryption, and decryption time compared to existing Encrypting File System standard algorithm (EFSSA).

Tópico(s): Machine Learning and Data Classification

2023 - Springer Science+Business Media | Lecture notes in electrical engineering

Capítulo de livro Acesso aberto Revisado por pares

Rajat Moona,

... of data. In this talk, we present an encrypting file system based on GNU/Linux based servers which can ...

Tópico(s): Security and Verification in Computing

2012 - Springer Science+Business Media | IFIP advances in information and communication technology