使无效 发表于 2025-3-26 22:50:56

Book 2016ecure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities,

干涉 发表于 2025-3-27 01:39:15

http://reply.papertrans.cn/87/8633/863273/863273_32.png

稀释前 发表于 2025-3-27 05:37:22

http://reply.papertrans.cn/87/8633/863273/863273_33.png

neolith 发表于 2025-3-27 11:32:20

http://reply.papertrans.cn/87/8633/863273/863273_34.png

Permanent 发表于 2025-3-27 16:08:14

IntroductionThis chapter explains the scope, motivation and structure of the book.

正面 发表于 2025-3-27 18:55:36

System Model and Security GoalThis chapter builds a system and adversarial model based on the survey of related work. This is the model that we use throughout this book. It also presents different types of storage media and illustrates the adversary’s abilities and the user’s goal.

ornithology 发表于 2025-3-28 00:14:36

http://reply.papertrans.cn/87/8633/863273/863273_37.png

正式演说 发表于 2025-3-28 05:40:17

http://reply.papertrans.cn/87/8633/863273/863273_38.png

Aprope 发表于 2025-3-28 07:35:11

Conclusion and Future WorkThis chapter is the conclusive part of this book. We review our contributions and integrate them into our systematization. We present some related and complementary lines of research that fall outside our scope but are still worth discussing. We then outline avenues for future research. Finally, we draw conclusions and summarize our work.

适宜 发表于 2025-3-28 10:39:11

Joel ReardonFirst book to offer a systematized comparison of secure deletion solutions.Shows how to build a system and adversarial model.Useful for researchers, graduate students, and practitioners.Includes suppl
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Secure Data Deletion; Joel Reardon Book 2016 Springer International Publishing Switzerland 2016 Secure deletion.Cloud security.Mobile secu