This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Design of a Cryptography Based Secure File System
September 1980 (vol. 6 no. 5)
pp. 411-420
E. Gudes, Wang Laboratories
The design of a secure file system based on user controlled cryptographic (UCC) transformations is investigated. With UCC transformations, cryptography not only complements other protection mechanisms, but can also enforce protection specifications. Files with different access permissions are enciphered by different cryptographic keys supplied by authorized users at access time. Several classes of protection policies such as: compartmentalized, hierarchical, and data dependent are discussed. Several protection implementation schemes are suggested and analyzed according to criteria such as: security, efficiency, and user convenience. These schemes provide a versatile and powerful set of design alternatives.
Index Terms:
protection specifications, Access control, cryptography, file security, one way ciphers
Citation:
E. Gudes, "The Design of a Cryptography Based Secure File System," IEEE Transactions on Software Engineering, vol. 6, no. 5, pp. 411-420, Sept. 1980, doi:10.1109/TSE.1980.230489
Usage of this product signifies your acceptance of the Terms of Use.