DocumentCode :
2382136
Title :
A Scheme Based on Trusted Computing for Terminal Security
Author :
Zhang, Jun ; Zhou, Zheng ; Liu, Wei-peng ; Li, Jian
Author_Institution :
Naval Univ. of Eng., Wuhan
fYear :
2007
fDate :
1-3 Nov. 2007
Firstpage :
218
Lastpage :
220
Abstract :
According to the current security problems of computer terminal and trusted computing goals proposed by Microsoft Corporation, this paper proposes a solution scheme based on trusted computing for terminal security. By means of formal method, it gives some rules to control user´s access to program and data based on its level. Legal programs only can run authorized operation and data file protected by cryptogram based on its level avoiding information leakage. A frame to realize the scheme is also given. And this scheme is described from security and privacy two facets.
Keywords :
authorisation; cryptography; authorization; cryptogram; data file protection; information leakage; legal program; terminal security; trusted computing; user access control; Computer security; Data engineering; Data privacy; Data security; Educational institutions; Gold; Information security; Law; Legal factors; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3016-1
Type :
conf
DOI :
10.1109/ISDPE.2007.111
Filename :
4402678
Link To Document :
بازگشت