Publisher's Synopsis
Papers from a December 2002 meeting focus on the weaknesses in security of stored information and technologies necessary for security in storage. Contributors are members of the storage, cryptography, and networking communities. Some specific topics include a two-layer approach for securing an object store network, encryption and key management in