Zachary N J Peterson
Zachary N J Peterson
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications†…, 2007
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
Ext3cow: a time-shifting file system for regulatory compliance
Z Peterson, R Burns
ACM Transactions on Storage (TOS) 1 (2), 190-212, 2005
Data placement for copy-on-write using virtual contiguity
ZNJ Peterson
University of California, Santa Cruz 2002., 2002
Securing electronic medical records using attribute-based encryption on mobile devices
JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ...
Proceedings of the 1st ACM workshop on Security and privacy in smartphones†…, 2011
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and†…, 2013
Secure Deletion for a Versioning File System.
ZNJ Peterson, RC Burns, J Herring, A Stubblefield, AD Rubin
FAST 5 (2005), 2005
Analysis of mutation and generation-based fuzzing
C Miller, ZNJ Peterson
Independent Security Evaluators, Tech. Rep 4, 2007
Design and Implementation of Verifiable Audit Trails for a Versioning File System.
ZNJ Peterson, RC Burns, G Ateniese, S Bono
FAST 7, 20-20, 2007
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
Valuing security by getting [d0x3d!]: Experiences with a network security board game
M Gondree, ZNJ Peterson
6th Workshop on Cyber Security Experimentation and Test ({CSET} 13), 2013
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
Zone-based shortest positioning time first scheduling for MEMS-based storage devices
B Hong, SA Brandt, DDE Long, EL Miller, KA Glocer, ZNJ Peterson
11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation†…, 2003
This is not a game: early observations on using alternate reality games for teaching security concepts to first-year undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
Method and apparatus for limiting access to sensitive data
ZNJ Peterson, AB Stubblefield, SC Bono, MD Green
US Patent 7,840,795, 2010
DEFY: A deniable, encrypted file system for log-structured storage
TM Peters, MA Gondree, ZNJ Peterson
Verifiable audit trails for a versioning file system
R Burns, Z Peterson, G Ateniese, S Bono
Proceedings of the 2005 ACM workshop on Storage security and survivability†…, 2005
Mixed approaches to cs0: Exploring topic and pedagogy variance after six years of cs0
ZJ Wood, J Clements, Z Peterson, D Janzen, H Smith, M Haungs, ...
Proceedings of the 49th ACM Technical Symposium on Computer Science†…, 2018
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
login Usenix Mag. 41 (1), 2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20