u need to read all those papers and all description on that.
· In this project, you should be a clearly written report that summarizes your understanding of the papers you have read. Instead of just enumerating results paper by paper, it should provide an integrated view of all the papers and the topic itself.
Topic : The Case for transient authentication
References:
1. Protecting Applications with Transient Authentication by MD Corner, 2003
http://www.cs.cornell.edu/People/egs//cornellonly/syslunch/fall03/transauth
2. Protecting File Systems with Transient Authentication, MARK D. CORNER and BRIAN D. NOBLE, 2005
http://deepblue.lib.umich.edu/bitstream/handle/2027.42/41362/11276_2004_Article_5384743 ?sequence=1
3. The Case for Transient Authentication by BD Noble 2002
http://forensics.umass.edu/pubs/mcorner/sigops02
4. Mobile Device Security Using Transient Authentication,
Anthony J. Nicholson
,
Mark D. Corner
,
Brian D. Noble
,2006
http://www.computer.org/csdl/trans/tm/2006/11/h1489-abs.html
5. Secure and Transient Role-Based Access Control for File Systems, Michael Kirkpatrick, Jeff Seibert, 2007
http://www.cs.purdue.edu/homes/mkirkpat/papers/cs526f07-secfs
6. Authentication in Transient Storage Device Attachments by Donald Rich, 2007
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4160236&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4160236
7. Zero Interaction Authentication by MD Corner, 2002
http://www.sigmobile.org/awards/mobicom2002-student
8.
Decentralized User Authentication in a Global File System, by Michael Kaminsky, George Savvides, David Mazieres, M. Frans Kaashoek, 2003
http://www.cs.wayne.edu/~lihao/Courses/CSC5270/Homework/Proj/p60-kaminsky
9. Transient Authentication by AratiShitole, TinuRathi, SnehalShahane, Aparna Rajegaonkar, Miss.SushilaShelake, 2013
http://www.ijrcct.org/index.php/ojs/article/view/177/141
10. Application of Cell-phonein Laptop Security, Rania Abdelhameed, Sabira Khatun, Borhanuddin Mohd Ali and Abdul Rahman Ramli, 2005
http://198.170.104.138/jas/2005/215-219
11. Authentication Standard for Transient Storage Devices at T10Meeting, Austin Texas , 2005
http://www.t10.org/ftp/t10/document.05/05-399r2