Coverart for item
The Resource Secure data deletion, Joel Reardon

Secure data deletion, Joel Reardon

Label
Secure data deletion
Title
Secure data deletion
Statement of responsibility
Joel Reardon
Creator
Author
Subject
Language
eng
Summary
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities, and then builds a system and adversarial model based on the survey of related work. The book is useful for both academics, researches and graduate students, and for practitioners who may integrate its results into deployed systems
Member of
Cataloging source
YDXCP
Illustrations
illustrations
Index
index present
LC call number
QA76.9.D3
LC item number
R4223 2016
Literary form
non fiction
Nature of contents
bibliography
Series statement
Information security and cryptography,
Secure data deletion, Joel Reardon
Label
Secure data deletion, Joel Reardon
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Bibliography note
Includes bibliographical references (pages 187-192) and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Part I. Introduction and background -- Introduction -- Related work on secure deletion -- System model and security goal -- Part II. Secure deletion for mobile storage -- Flash memory : background and related work -- User-level secure deletion on log-structured file systems -- Data node encrypted file system -- UBIFSec : adding DNEFS to UBIFS -- Part III. Secure deletion for remote storage -- Cloud storage : background and related work -- Secure data deletion from persistent media -- B-tree-based secure deletion -- Robust key management for secure data deletion -- Part IV. Conclusions -- Conclusion and future work
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319287775&userID=ebsco-test&password=ebsco-test
Dimensions
25 cm.
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b3916377'}
Extent
xvii, 203 pages
Isbn
9783319287775
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
(OCoLC)932095983

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...