[1] WANG J, YAO X, MITCHELL C, et al. A new hierarchical data cache architecture for iSCSI storage server[J]. IEEE Transactions on Computers, 2009, 58(4):433-447. [2] XU X, SU J. Research and implementation of iSCSI-based SAN static data encryption system[C]//ICCSNT 2012:Proceedings of the 20122nd International Conference on Computer Science and Network Technology. Piscataway, NJ:IEEE, 2012:257-260. [3] SUNG B, PARK S, LEE W, et al. Enhancing robustness of an iSCSI-based file system in wireless networks[C]//ACSAC 2008:Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference. Piscataway, NJ:IEEE, 2008:1-7. [4] GUITIERREZ C M, JEFFREY W, FURLANI C M. FIPS PUB 200:minimum security requirements for federal information and information systems[S/OL]. Gaithersburg, MD, USA:National Institute of Standards and Technology, 2006[2016-03-06]. https://www.mendeley.com/catalog/fips-pub-200-minimum-security-requirements-federal-information-information-systems/. [5] HUANG J, XIE C, LI X. iOBS3:an iSCSI-based object storage security system[C]//CIS 2006:Proceedings of the 2006 International Conference on Computational Intelligence and Security, LNCS 4456. Berlin:Springer-Verlag, 2006:620-626. [6] HE J, WANG L, LI Y-S, et al. Research and implement of security iSCSI based on SSL[C]//ICIC 2011:Proceedings of the 2011 Fourth International Conference on Information and Computing. Washington, DC:IEEE Computer Society, 2011:18-21. [7] LI S, JIA X. Research and application of transparent encrypting file system based on Windows kernel[C]//CiSE 2010:Proceedings of the 2010 International Conference on Computational Intelligence and Software Engineering. Piscataway, NJ:IEEE, 2010:1-4. [8] YANG L, LI Y, ZHENG L. Transparent encryption based on network file system filtering driver[C]//ICEICE 2011:Proceedings of the 2011 International Conference on Electric Information and Control Engineering. Piscataway, NJ:IEEE, 2011:6339-6342. [9] MIAO Q-X. Research and analysis on encryption principle of TrueCrypt software system[C]//ICISE 2010:Proceedings of the 2nd International Conference on Information Science and Engineering. Piscataway, NJ:IEEE, 2010:1409-1412. [10] 陶天一. 基于TrueCrypt的自安全磁盘加密系统的研究与实现[D].北京:北京邮电大学, 2013:22-69. (TAO T Y. Research and implementation of self-securing disk encrypted system based on TrueCrypt[D]. Beijing:Beijing University of Posts and Telecommunications, 2013:22-69.). [11] BERTINO E. Data Protection from Insider Threats (Synthesis Lectures on Data Management)[M].[S.l.]:Morgan & Claypool Publishers, 2012:1-91. [12] CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection:a survey[J]. ACM Computing Surveys (CSUR), 2009, 41(3):Article No. 15. [13] SUN Y, HOU Z, WEI W. A new approach for data protection in case of the physical device being stolen-Using hybrid storage[C]//JICSIT 2011:Proceedings of the 201113th IEEE Joint International Computer Science and Information Technology Conference. Piscataway, NJ:IEEE, 2013:1-4. |