Temporary File

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2841 Experts worldwide ranked by ideXlab platform

Chao-wen Chang - One of the best experts on this subject based on the ideXlab platform.

  • Research and Design of Full Disk Encryption Based on Virtual Machine
    2014
    Co-Authors: Min Liang, Chao-wen Chang
    Abstract:

    Abstract—Encryption is an effective method to protect private information. But the operating system and the Temporary File of privacy are usually ignored. There are not adequate mechanisms to protect Temporary Files, page Files and system Files. The privacy is not security only by encrypting itself. The full disk encryption (FDE) is the preferred mechanism to address this problem because, as the name implies, it encrypts the entire hard disk so that confidence is protected, no matter where it resides. In this paper, we describe a full disk encryption scheme based on XEN virtual machine which is stored in a security flash disk. XEN is used to encrypt (decrypt) all the data in hard disk and manage the whole system. Keywords-full disk encryption; XEN virtual machine; key management I

  • Research and design of full disk encryption based on virtual machine
    2010 3rd International Conference on Computer Science and Information Technology, 2010
    Co-Authors: Min Liang, Chao-wen Chang
    Abstract:

    Encryption is an effective method to protect private information. But the operating system and the Temporary File of privacy are usually ignored. There are not adequate mechanisms to protect Temporary Files, page Files and system Files. The privacy is not security only by encrypting itself. The full disk encryption (FDE) is the preferred mechanism to address this problem because, as the name implies, it encrypts the entire hard disk so that confidence is protected, no matter where it resides. In this paper, we describe a full disk encryption scheme based on XEN virtual machine which is stored in a security flash disk. XEN is used to encrypt (decrypt) all the data in hard disk and manage the whole system.

Min Liang - One of the best experts on this subject based on the ideXlab platform.

  • Research and Design of Full Disk Encryption Based on Virtual Machine
    2014
    Co-Authors: Min Liang, Chao-wen Chang
    Abstract:

    Abstract—Encryption is an effective method to protect private information. But the operating system and the Temporary File of privacy are usually ignored. There are not adequate mechanisms to protect Temporary Files, page Files and system Files. The privacy is not security only by encrypting itself. The full disk encryption (FDE) is the preferred mechanism to address this problem because, as the name implies, it encrypts the entire hard disk so that confidence is protected, no matter where it resides. In this paper, we describe a full disk encryption scheme based on XEN virtual machine which is stored in a security flash disk. XEN is used to encrypt (decrypt) all the data in hard disk and manage the whole system. Keywords-full disk encryption; XEN virtual machine; key management I

  • Research and design of full disk encryption based on virtual machine
    2010 3rd International Conference on Computer Science and Information Technology, 2010
    Co-Authors: Min Liang, Chao-wen Chang
    Abstract:

    Encryption is an effective method to protect private information. But the operating system and the Temporary File of privacy are usually ignored. There are not adequate mechanisms to protect Temporary Files, page Files and system Files. The privacy is not security only by encrypting itself. The full disk encryption (FDE) is the preferred mechanism to address this problem because, as the name implies, it encrypts the entire hard disk so that confidence is protected, no matter where it resides. In this paper, we describe a full disk encryption scheme based on XEN virtual machine which is stored in a security flash disk. XEN is used to encrypt (decrypt) all the data in hard disk and manage the whole system.

Katsutaka Kimura - One of the best experts on this subject based on the ideXlab platform.

  • 20 mb s erase record flash memory by asymmetrical operation
    Symposium on VLSI Circuits, 1996
    Co-Authors: Takayuki Kawahara, Y Jyouno, S Saeki, N Miyamoto, Katsutaka Kimura
    Abstract:

    The high density and low power of a flash memory makes it attractive for use as a Temporary File memory of moving-pictures in future personal HDTV movie cameras with MPEG2 encoders. In this application, the recorded images are likely to be down-loaded to a permanent File within a month, and the total number of times each memory card is used will probably be less than 10/sup 4/. However, the target recording rate of 20 Mb/s is one order faster than that of the conventional flash memory. This paper, therefore, proposes high-speed erase/record circuit technologies based on asymmetrical operation, in which Vthi is set below the threshold voltage of the recording state. This scheme with accurate fast bit control, continuous record operation, and multi-phase word driving, makes 20 Mb/s erase/record flash memories attainable.

Greg Kroahhartman - One of the best experts on this subject based on the ideXlab platform.

  • raceguard kernel protection from Temporary File race vulnerabilities
    USENIX Security Symposium, 2001
    Co-Authors: Crispin Cowan, Steve Beattie, Chris Wright, Greg Kroahhartman
    Abstract:

    Temporary File race vulnerabilities occur when privileged programs attempt to create Temporary Files in an unsafe manner. "Unsafe" means "non-atomic with respect to an attacker's activities." There is no portable standard for safely (atomically) creating Temporary Files, and many operating systems have no safe Temporary File creation at all. As a result, many programs continue to use unsafe means to create Temporary Files, resulting in widespread vulnerabilities. This paper presents Race-Guard: a kernel enhancement that detects attempts to exploit Temporary File race vulnerabilities, and does so with sufficient speed and precision that the attack can be halted before it takes effect. RaceGuard has been implemented, tested, and measured. We show that RaceGuard is effective at stopping Temporary File race attacks, preserves compatibility (no legitimate software is broken), and preserves performance (overhead is minimal).

Takayuki Kawahara - One of the best experts on this subject based on the ideXlab platform.

  • 20 mb s erase record flash memory by asymmetrical operation
    Symposium on VLSI Circuits, 1996
    Co-Authors: Takayuki Kawahara, Y Jyouno, S Saeki, N Miyamoto, Katsutaka Kimura
    Abstract:

    The high density and low power of a flash memory makes it attractive for use as a Temporary File memory of moving-pictures in future personal HDTV movie cameras with MPEG2 encoders. In this application, the recorded images are likely to be down-loaded to a permanent File within a month, and the total number of times each memory card is used will probably be less than 10/sup 4/. However, the target recording rate of 20 Mb/s is one order faster than that of the conventional flash memory. This paper, therefore, proposes high-speed erase/record circuit technologies based on asymmetrical operation, in which Vthi is set below the threshold voltage of the recording state. This scheme with accurate fast bit control, continuous record operation, and multi-phase word driving, makes 20 Mb/s erase/record flash memories attainable.