Encryption based security system for network storage

S Plotkin, D Avida - US Patent 8,335,915, 2012 - Google Patents
The presently preferred embodiment of the invention provides an encryption based security
system for network storage that separates the ability to access storage from the ability to …

Plug-n-trust: practical trusted sensing for mhealth

JM Sorber, M Shin, R Peterson, D Kotz - Proceedings of the 10th …, 2012 - dl.acm.org
Mobile computing and sensing technologies present exciting opportunities for healthcare.
Prescription wireless sensors worn by patients can automatically deliver medical data to …

System and method for initial key establishment using a split knowledge protocol

A Subramanian, LWH Chang - US Patent 8,245,050, 2012 - Google Patents
A split knowledge protocol adapted to establish an initial key for use in authenticating a first
computer to a second computer. The second computer initiates the split knowledge protocol …

Authorizing administrative operations using a split knowledge protocol

LWH Chang, A Subramanian - US Patent 8,190,905, 2012 - Google Patents
(57) ABSTRACT A system and method for authorizing administrative opera tions in a
computer is provided. The computer initiates the split knowledge protocol upon an attempt …

Distributed management of crypto module white lists

RJ Sussland, JO Silberman, A Subramanian… - US Patent …, 2012 - Google Patents
An apparatus and method for managing the distribution and expansion of public keys held
by a group or array of systems in white lists. The addition of a new system to the array entails …

Security implications in Kerberos by the introduction of smart cards

N Mavrogiannopoulos, A Pashalidis… - Proceedings of the 7th …, 2012 - dl.acm.org
Public key Kerberos (PKINIT) is a standardized authentication and key establishment
protocol which is used by the Windows active directory subsystem. In this paper we show …

Analyses sécuritaires de code de carte à puce sous attaques physiques simulées

X Kauffmann-Tourkestansky - 2012 - theses.hal.science
Cette thèse s' intéresse aux effets des attaques par fautes physiques sur le code d'un
système embarqué en particulier la carte à puce. De telles attaques peuvent compromettre …

Background encryption of disks in a large cluster

S Chang - US Patent 8,171,307, 2012 - Google Patents
The invention provides for rekeying a large cluster of storage security appliances which
allows more than two of the storage security appliances to proxy a single storage medium …

iSCSI name forwarding technique

I Chang - US Patent 8,181,011, 2012 - Google Patents
An iSCSI name forwarding technique allows a security appli ance to assume iSCSI names of
one or more clients and one or more storage systems in a network. The security appliance is …

Tape failover across a cluster

A Chaudhary, A Narver - US Patent 8,160,257, 2012 - Google Patents
A security appliance that encrypts and decrypts information is installed in each of redundant
multi-paths between a host system and a back up tape storage system. The host system is …