DocumentCode :
2795550
Title :
A security model to protect sensitive information flows based on trusted computing technologies
Author :
Wang, Shi-hua ; Li, Xiao-yong
Author_Institution :
Dept. of Inf. Security, Sichuan Univ., Chengdu
Volume :
7
fYear :
2008
fDate :
12-15 July 2008
Firstpage :
3646
Lastpage :
3650
Abstract :
The sensitive information leakage accidents due to insiders were always troublesome. Based on trusted computing technologies the paper designs a model called secure information flows control model ( SIFCM for short) that will be applied in sensitive organizations. SIFCM protects sensitive information by encrypting any sensitive information flowing out of the system and guaranteeing the confidentiality of sensitive information against decryption outside the system boundary. The model is based on the hardware protection capability of trusted computing to prevent the keys from being obtained by unauthorized persons.
Keywords :
cryptography; data privacy; decryption; encrypting; secure information flows control model; sensitive information flow protection; sensitive information leakage accidents; trusted computing; Application software; Computer security; Cryptography; Cybernetics; Data security; Hardware; Information security; Information systems; Machine learning; Protection; Cryptography; Information flow control; Information security; Key management; Trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Machine Learning and Cybernetics, 2008 International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-4244-2095-7
Electronic_ISBN :
978-1-4244-2096-4
Type :
conf
DOI :
10.1109/ICMLC.2008.4621038
Filename :
4621038
Link To Document :
بازگشت