Zachary N J Peterson
Zachary N J Peterson
Geverifieerd e-mailadres voor calpoly.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications†…, 2007
33012007
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
4592011
Ext3cow: a time-shifting file system for regulatory compliance
Z Peterson, R Burns
ACM Transactions on Storage (TOS) 1 (2), 190-212, 2005
279*2005
Data placement for copy-on-write using virtual contiguity
ZNJ Peterson
University of California, Santa Cruz 2002., 2002
2402002
Securing electronic medical records using attribute-based encryption on mobile devices
JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ...
Proceedings of the 1st ACM workshop on Security and privacy in smartphones†…, 2011
2372011
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
1152011
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and†…, 2013
932013
Secure Deletion for a Versioning File System.
ZNJ Peterson, RC Burns, J Herring, A Stubblefield, AD Rubin
FAST 5 (2005), 2005
912005
Analysis of mutation and generation-based fuzzing
C Miller, ZNJ Peterson
Independent Security Evaluators, Tech. Rep 4, 2007
672007
Design and Implementation of Verifiable Audit Trails for a Versioning File System.
ZNJ Peterson, RC Burns, G Ateniese, S Bono
FAST 7, 20-20, 2007
482007
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
412013
Valuing security by getting [d0x3d!]: Experiences with a network security board game
M Gondree, ZNJ Peterson
6th Workshop on Cyber Security Experimentation and Test ({CSET} 13), 2013
332013
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
302016
Zone-based shortest positioning time first scheduling for MEMS-based storage devices
B Hong, SA Brandt, DDE Long, EL Miller, KA Glocer, ZNJ Peterson
11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation†…, 2003
292003
This is not a game: early observations on using alternate reality games for teaching security concepts to first-year undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
282015
Method and apparatus for limiting access to sensitive data
ZNJ Peterson, AB Stubblefield, SC Bono, MD Green
US Patent 7,840,795, 2010
272010
DEFY: A deniable, encrypted file system for log-structured storage
TM Peters, MA Gondree, ZNJ Peterson
262015
Verifiable audit trails for a versioning file system
R Burns, Z Peterson, G Ateniese, S Bono
Proceedings of the 2005 ACM workshop on Storage security and survivability†…, 2005
192005
Mixed approaches to cs0: Exploring topic and pedagogy variance after six years of cs0
ZJ Wood, J Clements, Z Peterson, D Janzen, H Smith, M Haungs, ...
Proceedings of the 49th ACM Technical Symposium on Computer Science†…, 2018
152018
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
login Usenix Mag. 41 (1), 2016
112016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20