使无效
发表于 2025-3-26 22:50:56
Book 2016ecure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities,
干涉
发表于 2025-3-27 01:39:15
http://reply.papertrans.cn/87/8633/863273/863273_32.png
稀释前
发表于 2025-3-27 05:37:22
http://reply.papertrans.cn/87/8633/863273/863273_33.png
neolith
发表于 2025-3-27 11:32:20
http://reply.papertrans.cn/87/8633/863273/863273_34.png
Permanent
发表于 2025-3-27 16:08:14
IntroductionThis chapter explains the scope, motivation and structure of the book.
正面
发表于 2025-3-27 18:55:36
System Model and Security GoalThis chapter builds a system and adversarial model based on the survey of related work. This is the model that we use throughout this book. It also presents different types of storage media and illustrates the adversary’s abilities and the user’s goal.
ornithology
发表于 2025-3-28 00:14:36
http://reply.papertrans.cn/87/8633/863273/863273_37.png
正式演说
发表于 2025-3-28 05:40:17
http://reply.papertrans.cn/87/8633/863273/863273_38.png
Aprope
发表于 2025-3-28 07:35:11
Conclusion and Future WorkThis chapter is the conclusive part of this book. We review our contributions and integrate them into our systematization. We present some related and complementary lines of research that fall outside our scope but are still worth discussing. We then outline avenues for future research. Finally, we draw conclusions and summarize our work.
适宜
发表于 2025-3-28 10:39:11
Joel ReardonFirst book to offer a systematized comparison of secure deletion solutions.Shows how to build a system and adversarial model.Useful for researchers, graduate students, and practitioners.Includes suppl