skip to main content
10.1145/1103576.1103583acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Formal security analysis of basic network-attached storage

Published: 11 November 2005 Publication History
First page of PDF

References

[1]
M. Abadi. Protection in programming language translations. In ICALP'98: Proceedings of the 25th International Colloquium ob Automata, Languages and Programming, pages 868--883. Springer-Verlag, 1998.
[2]
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749--786, 1999.
[3]
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In POPL'01: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 104--115. ACM Press, 2001.
[4]
M. Abadi, C. Fournet, and G. Gonthier. Authentication primitives and their compilation. In POPL'00: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 302--315. ACM Press, 2000.
[5]
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1): 37--83, Apr. 2002.
[6]
M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report SRC-RR-149, Digital Systems Research Center, Palo Alto CA, January 1998.
[7]
B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86--100, May 2004.
[8]
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233--271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No.39, February 1989.
[9]
G.A. Gibson, D.P. Nagle, K. Amiri, F.W. Chang, E. Feinberg, H.G.C. Lee, B. Ozceri, E. Riede, and D. Rochberg. A case for network-attached secure disks. Technical Report CMU. CS-96-142, 1996.
[10]
H. Gobioff. Security for a High Performance Commodity Storage Subsystem. PhD thesis, Carnegie Mellon University, 1999.
[11]
H. Gobioff, G. Gibson, and J. Tygar. Security for network attached storage devices. Technical Report CMU-CS-97-185, Carnegie Mellon University, October 1997.
[12]
A.D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoritical Computer Science, 300(1-3):379--409, 2003.
[13]
A. Kennedy. Untrustworthy programming anguages. Talk at the Joint Queen Mary/Imperial College Seminar series, May 2005. Slides available at http://research.microsoft.com/~akenn/sec/index.htm.
[14]
L. Lamport. Specifying Systems: The TLA+Language and Tools for Hardware and Software Engineers. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
[15]
D. Mazieres and D. Shasha. Building secure file systems out of byzantine storage. In PODC'02: Proceedings of the 21st Symposium on Principles of Distributed Computing, pages 108--117. ACM Press, 2002.
[16]
E.L. Miller, D.D.E. Long, W.E. Freeman, and B. Reed. Strong security for network-attached storage. In FAST'02: Proceedings of the Conference on File and Storage Technologies, pages 1--13. USENIX Association, 2002.
[17]
R. Milner. Fully abstract models of typed lambda-calculi. Theoretical Computer Science, 4(1):1--22, 1977.
[18]
R. Milner. The polyadic pi-calculus: a tutorial. In F.L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Logic and Algebra of Specification, pages 203--246. Springer-Verlag, 1993.
[19]
R.D. Nicola and M.C.B. Hennessy. Testing equivalences for processes. Theoretical Computer Science, 34(1--2):83--133, Nov. 1984.
[20]
B.C. Reed, E.G. Chron, R.C. Burns, and D.D.E. Long. Authenticating network-attached storage. IEEE Micro, 20(1):49--57, Jan. 2000.
[21]
Y. Zhu and Y. Hu. SNARE: A strong security scheme for network-attached storage. In SRDS'03: Proceedings of the 22nd Symposium on Reliable Distributed Systems, pages 250--259. IEEE Computer Society, 2003.

Cited By

View all
  • (2018)Literature Survey of Role Policy Access Using Cloud2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)10.1109/ICOEI.2018.8553790(232-236)Online publication date: May-2018
  • (2010)Formal approaches to location management in mobile communicationsProceedings of the 6th international conference on Distributed Computing and Internet Technology10.1007/978-3-642-11659-9_27(243-254)Online publication date: 15-Feb-2010
  • (2008)Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted StorageProceedings of the 2008 IEEE Symposium on Security and Privacy10.1109/SP.2008.12(417-431)Online publication date: 18-May-2008
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
FMSE '05: Proceedings of the 2005 ACM workshop on Formal methods in security engineering
November 2005
90 pages
ISBN:1595932313
DOI:10.1145/1103576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. applied pi calculus
  2. full abstraction
  3. secure storage

Qualifiers

  • Article

Conference

CCS05
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Literature Survey of Role Policy Access Using Cloud2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)10.1109/ICOEI.2018.8553790(232-236)Online publication date: May-2018
  • (2010)Formal approaches to location management in mobile communicationsProceedings of the 6th international conference on Distributed Computing and Internet Technology10.1007/978-3-642-11659-9_27(243-254)Online publication date: 15-Feb-2010
  • (2008)Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted StorageProceedings of the 2008 IEEE Symposium on Security and Privacy10.1109/SP.2008.12(417-431)Online publication date: 18-May-2008
  • (2008)Tamper Difficult Technique for Data Residing on Passive StorageProceedings of the 2008 International Symposium on Electronic Commerce and Security10.1109/ISECS.2008.123(439-442)Online publication date: 3-Aug-2008
  • (2008)Extended pi-CalculiProceedings of the 35th international colloquium on Automata, Languages and Programming, Part II10.1007/978-3-540-70583-3_8(87-98)Online publication date: 7-Jul-2008
  • (2006)Secrecy by Typing and File-Access ControlProceedings of the 19th IEEE workshop on Computer Security Foundations10.1109/CSFW.2006.28(112-123)Online publication date: 5-Jul-2006
  • (2006)Formal analysis of dynamic, distributed file-system access controlsProceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems10.1007/11888116_8(99-114)Online publication date: 26-Sep-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media