Metrika članka

  • citati u SCindeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:0
  • preuzimanja u poslednjih 30 dana:0
članak: 3 od 21  
Back povratak na rezultate
Info M
2013, vol. 12, br. 47, str. 32-37
jezik rada: srpski
vrsta rada: članak
objavljeno: 14/10/2013
Pregled primjenjenih pristupa za softversku enkripciju podataka u različitim operativnim sistemima
aVisoka škola za ekonomiju i informatiku, Prijedor, B&H
bUniverzitet u Beogradu, Fakultet organizacionih nauka

e-adresa: damjanovic@koledzprijedor.org, dsimic@fon.bg.ac.rs

Projekat

Primena multimodalne biometrije u menadžmentu identiteta (MPNTR - 32013)

Sažetak

Paralelno sa rastom količine digitalnih informacija koje se smještaju u računarskim sistemima raste i važnost zaštite navedenih podataka. Današnji operativni sistemi nude veliki broj različitih mehanizama za šifrovanje podataka koji često pružaju nejednak nivo zaštite. U ovom tekstu će biti dat pregled osnovnih kriptografskih rješenja zasnovanih na nivou bloka (block based) i na nivou datoteke (file based) koja su se koristila i koja se još koriste u operativnim sistemima zajedno sa prikazom napora za objedinjavanjem kriptografskih API-ja u operativnim sistemima Linux i Windows.

Ključne reči

Reference

*** Notes on the implementation of encryption in Android 3.0, Android open source project Teach Info. http://source.android.com/tech/encryption/android_crypto_implementation.html
*** Apple Technical White Paper, Best Practices for Deploying FileVault 2, Deploying OS X Full Disk Encryption Technology, avgust 2012. http://training.apple.com/pdf/WP_FileVault2.pdf
*** Cryptographic Module Validation Program, National Institute Of Standards And Technology. Dostupno na: http://csrc.nist.gov/groups/STM/cmvp/index.html, Pristupano: avgust 2013
*** (2013) Fedora crypto consolidation: Fedora project. https://fedoraproject.org/wiki/FedoraCryptoConsolidation
*** (2013) Network security services: Mozilla developer network. https://developer.mozilla.org/en/docs/NSS
*** (2013) FIPS 140-2 security policy document: Red hat enterprise Linux 6. 2 kernel crypto API cryptographic module v2. O. februar
*** (2011) FIPS 140-2 security policy document: Microsoft windows cryptographic primitives Library (bcryptprimitives. dll) security policy document. maj
Blaze, M. (1993) A cryptographic file system for Unix. u: ACM Conference on Computer and Communications Security
Coleridge, R. (1996) The cryptography API, or how to keep a secret. august, http://msdn.microsoft.com/en-us/library/ms867086.aspx
Cooke, J.L., Bryson, D. (2003) Strong cryptography in the Linux Kernel. u: Linux Symposium, Ottawa, Canada, jul, Proceedings, 139-144
Corner, M., Noble, B.D. (2002) Zero-interaction authentication. u: The Eigth ACM Conference on Mobile Computing and Networking, September
Damjanović, B., Simić, D. (2013) Performance evaluation of AES algorithm under Linux operating system. Proceedings Of The Romanian Academy, Series A, Mathematics, Physics, Technical Sciences, Information Science, Volume 14, Number 2, 177-183, April - June
Defreez, D. (2012) Android Privacy Through Encryption. Science in Mathematics and Computer Science, Southern Oregon University, Master Thesis
Diesburg, S.M., Wang, A.A. (2010) A survey of confidential data storage and deletion methods. ACM Computing Surveys, 43(1): 1-37
Ermelindo, M. (1997) Transparent Cryptographic File System. Linux Journal, No. 3. Aug. 40
Ferguson, N. (2006) AES-CBC + elephant diffuser a disk encryption algorithm for windows vista. u: Microsoft White Paper
Fuller, J., Ha, J., OBrien, D., Radvan, S., Christensen, E., Ligas, A. Fedora security guide. http://docs.fedoraproject.org
Gough, V. (2008) EncFS: Encrypted file system. http://arg0.net/wiki/encfs
Halcrow, M. (2007) eCryptfs: A stacked cryptographic file system. Linux Journal, Volume Issue 156, April
Hohmann, C. (2008) CryptoFS. http://reboot.animeirc.de/cryptofs
IBM Blueprints (2009) Securing sensitive files with TPM keys. IBM Corporation
Microsoft Corp (2005) Using encrypting file system. Tech. rep., http://technet.microsoft.com/en-us/library/bb457116.aspx
Microsoft Corp (2008) How EFS works. Tech. Rep., http://technet.microsoft.com/en-us/library/cc962103.aspx
Microsoft Corp (2013) MSDN cryptography A.P.I. next generation. http://msdn.microsoft.com/en-us/library/windows/desktop/aa376210(v=vs.85).aspx
Microsoft Corp (2013) TechNet, cryptography next generation. http://technet.microsoft. com/en-us/library/cc730763(v=ws.10).aspx
Microsoft Corp (2012) FIPS 140 evaluation. http://technet.microsoft.com/en-us/library/cc750357.aspx
Moffat, D. (2012) How to manage ZFS data encryption. Oracle technetwork
Morris, J. (2003) The Linux Kernel Cryptographic API. Linux Journal, Issue 108, april 2003
Morris, J. (2011) Overview of Linux Kernel security features. http://www.linux.com/learn/docs/727873-overview-of-linux-kernel-security-features
Petullo, W.M. (2007) Disk encryption in Fedora: Past, present and future. RedHat Magazine, jan, http://magazine.redhat.com/2007/01/18
Red Hat Inc Device-mapper resource page. http://sources.redhat.com/dm
Saarinen, M.J.O. (2005) Encrypted watermarks and Linux laptop security. u: WISA04 Proceedings of the 5th international conference on Information Security Applications, Berlin - Heidelberg: Springer-Verlag
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., Lyon, B. (1985) Design and implementation of the sun network file system. u: USENIX Conference Proceedings, Berkeley, CA: USENIX Association, Summer
Szeredi, M. (2008) Filesystem in USEr space. http://sourceforge.net/projects/avf
Wright, C.P. (2004) Operating system support for extensible secure file systems. u: Technical Report FSL-04-02, maj
Zadok, E., Nieh, J. (2000) FiST: A language for stackable file systems. u: Annual USENIX Technical Conference, Proceedings, Berkeley, CA: USENIX Association, 55-70
Zadok, E. (2001) FiST: A System for Stackable File - System Code Generation. Columbia University, PhD Thesis
Zadok, E., Badulescu, I., Shender, A. (1998) Cryptfs: A stackable Vnode level encryption file system. u: Technical Report CUCS-021-98, Computer Science Department, Columbia University, jul, http://www.cs.columbia.edu/library/
Zadok, E., Badulescu, I., Shender, A. (1999) Extending file systems using stackable templates. u: USENIX Annual Technical Conference, Monterey, California, USA, jun, Proceedings