Architecture and Interface of a Self-Securing Object Store
نویسندگان
چکیده
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within this window, system administrators have valuable information for intrusion diagnosis and recovery. This thesis discusses the architecture behind the Self-Securing Storage Systems ($4) project. It also presents the external interface that the $4 drive uses for communication with client systems. The design and evaluation of the initial S4/NFS client is presented as an example client-side interface to a self-securing object store.
منابع مشابه
An Alternative Architecture for Objects: Lessons from the mushroom project
Over the last six years, the mushroom project at the University of Manchester has investigated alternative computer architectures for support of object-oriented systems. After much simulation and design study, we designed an architecture which we believe is especially suited to the characteristics of object-oriented systems, and constructed a prototype implementation of that architecture. Detai...
متن کاملPersistent object stores
The design and development of a type secure persistent object store is presented as part of an architecture to support experiments in concurrency, transactions and distribution. The persistence abstraction hides the physical properties of data from the programs that manipulate it. Consequently, a persistent object store is required to be of unbounded size, infinitely fast and totally reliable. ...
متن کاملAvailability evaluation of Software architecture of object oriented Style using coloured Petri nets
Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application model. An executable model of software architecture is an official description of architectu...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملResonance Ultrasonic Spectroscopy of a Nanofibrous Composite and Studying the Effect of Surface/Interface
Resonances are intrinsic characteristics of an elastic object, which are completely independent of the source of excitation. The appropriate utilization of the information contained within the resonance spectra and the identification of the resonance frequencies of the object can be used as a potent tool for material characterization. In this paper, a new mathematical model for the wave diffrac...
متن کامل