Encryption based security system for network storage
S Plotkin, D Avida - US Patent 8,335,915, 2012 - Google Patents
The presently preferred embodiment of the invention provides an encryption based security
system for network storage that separates the ability to access storage from the ability to …
system for network storage that separates the ability to access storage from the ability to …
Plug-n-trust: practical trusted sensing for mhealth
Mobile computing and sensing technologies present exciting opportunities for healthcare.
Prescription wireless sensors worn by patients can automatically deliver medical data to …
Prescription wireless sensors worn by patients can automatically deliver medical data to …
System and method for initial key establishment using a split knowledge protocol
A Subramanian, LWH Chang - US Patent 8,245,050, 2012 - Google Patents
A split knowledge protocol adapted to establish an initial key for use in authenticating a first
computer to a second computer. The second computer initiates the split knowledge protocol …
computer to a second computer. The second computer initiates the split knowledge protocol …
Authorizing administrative operations using a split knowledge protocol
LWH Chang, A Subramanian - US Patent 8,190,905, 2012 - Google Patents
(57) ABSTRACT A system and method for authorizing administrative opera tions in a
computer is provided. The computer initiates the split knowledge protocol upon an attempt …
computer is provided. The computer initiates the split knowledge protocol upon an attempt …
Distributed management of crypto module white lists
RJ Sussland, JO Silberman, A Subramanian… - US Patent …, 2012 - Google Patents
An apparatus and method for managing the distribution and expansion of public keys held
by a group or array of systems in white lists. The addition of a new system to the array entails …
by a group or array of systems in white lists. The addition of a new system to the array entails …
Security implications in Kerberos by the introduction of smart cards
N Mavrogiannopoulos, A Pashalidis… - Proceedings of the 7th …, 2012 - dl.acm.org
Public key Kerberos (PKINIT) is a standardized authentication and key establishment
protocol which is used by the Windows active directory subsystem. In this paper we show …
protocol which is used by the Windows active directory subsystem. In this paper we show …
Analyses sécuritaires de code de carte à puce sous attaques physiques simulées
X Kauffmann-Tourkestansky - 2012 - theses.hal.science
Cette thèse s' intéresse aux effets des attaques par fautes physiques sur le code d'un
système embarqué en particulier la carte à puce. De telles attaques peuvent compromettre …
système embarqué en particulier la carte à puce. De telles attaques peuvent compromettre …
Background encryption of disks in a large cluster
S Chang - US Patent 8,171,307, 2012 - Google Patents
The invention provides for rekeying a large cluster of storage security appliances which
allows more than two of the storage security appliances to proxy a single storage medium …
allows more than two of the storage security appliances to proxy a single storage medium …
iSCSI name forwarding technique
I Chang - US Patent 8,181,011, 2012 - Google Patents
An iSCSI name forwarding technique allows a security appli ance to assume iSCSI names of
one or more clients and one or more storage systems in a network. The security appliance is …
one or more clients and one or more storage systems in a network. The security appliance is …
Tape failover across a cluster
A Chaudhary, A Narver - US Patent 8,160,257, 2012 - Google Patents
A security appliance that encrypts and decrypts information is installed in each of redundant
multi-paths between a host system and a back up tape storage system. The host system is …
multi-paths between a host system and a back up tape storage system. The host system is …