Protecting the integrity of an entire file system | IEEE Conference Publication | IEEE Xplore