使无效 发表于 2025-3-26 22:50:56
Book 2016ecure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities,干涉 发表于 2025-3-27 01:39:15
http://reply.papertrans.cn/87/8633/863273/863273_32.png稀释前 发表于 2025-3-27 05:37:22
http://reply.papertrans.cn/87/8633/863273/863273_33.pngneolith 发表于 2025-3-27 11:32:20
http://reply.papertrans.cn/87/8633/863273/863273_34.pngPermanent 发表于 2025-3-27 16:08:14
IntroductionThis chapter explains the scope, motivation and structure of the book.正面 发表于 2025-3-27 18:55:36
System Model and Security GoalThis chapter builds a system and adversarial model based on the survey of related work. This is the model that we use throughout this book. It also presents different types of storage media and illustrates the adversary’s abilities and the user’s goal.ornithology 发表于 2025-3-28 00:14:36
http://reply.papertrans.cn/87/8633/863273/863273_37.png正式演说 发表于 2025-3-28 05:40:17
http://reply.papertrans.cn/87/8633/863273/863273_38.pngAprope 发表于 2025-3-28 07:35:11
Conclusion and Future WorkThis chapter is the conclusive part of this book. We review our contributions and integrate them into our systematization. We present some related and complementary lines of research that fall outside our scope but are still worth discussing. We then outline avenues for future research. Finally, we draw conclusions and summarize our work.适宜 发表于 2025-3-28 10:39:11
Joel ReardonFirst book to offer a systematized comparison of secure deletion solutions.Shows how to build a system and adversarial model.Useful for researchers, graduate students, and practitioners.Includes suppl