[1] SNIA-Storage Networking Industry Association. OSD: Object Based Storage Devices Technical Work Group[EB/OL].[2010-05-11]. http://www.snia.org/tech activities/workgroups/osd/.
[2] Factor M, Meth K, Naor D, et al. Object Storage: the Future Building Block for Storage Systems[C]//Local to Global Data Interoperability-Challenges and Technologies. Sardinia: IEEE Press, 2005: 119-123.
[3] Kher V, Kim Y. Securing Distributed Storage: Challenges, Techniques, and Systems[C]//StorageSS'05. Virginia: ACM, 2005: 9-25.
[4] Gibson G A, Nagle D F, Courtright W, et al. NASD Scalable Storage Systems[C]//Proceedings of the USENIX'99 Extreme Linux Workshop. Monterey: USENIX. 1999: 121-130.
[5] Halevi S, Karger P A, Naor D. Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control[EB/OL].[2010-05-11]. http://eprint.iacr.org/2005/169.
[6] Garg D. Proof Theory for Authorization Logic and Its Application to a Practical File System[D]. Pittsburgh: School of Computer Science, 2009.
[7] Garg D, Pfenning F. A Proof-carrying File System[R]. Pittsburgh: MU-CS-09-123, Carnegie Mellon University, 2009.
[8] Blanchet B. Automatic Verification of Correspondences for Security Protocols[J]. Journal of Computer Security, 2009, 17(4): 363-434.
[9] Niu Zhongying, Jiang Hong, Zhou Ke, et al. Identification and Authentication in Large-Scale Storage Systems[C]//2009 IEEE International Conference on Networking, Architecture, and Storage. Changsha: IEEE Press, 2009: 421-427.
[10] Canetti R, Krawczyk H. Analysis of Key-exchange Protocols and Their Use for Building Secure Channels[C]//Proceedings of EUROCRYPTO'01, LNCS 2045. Berlin: Springer-Verlag, 2001: 453-474.
[11] 张帆, 马建峰. WAPI认证机制的性能和安全性分析[J]. 西安电子科技大学学报, 2004, 31(1): 210-215.
Zhang Fan, Ma Jianfeng. Security Analysis of the Chinese Wireless LAN Standard Implementation Plan[J]. Journal of Xidian University, 2004, 31(1): 210-215. |