• DocumentCode
    2382136
  • Title

    A Scheme Based on Trusted Computing for Terminal Security

  • Author

    Zhang, Jun ; Zhou, Zheng ; Liu, Wei-peng ; Li, Jian

  • Author_Institution
    Naval Univ. of Eng., Wuhan
  • fYear
    2007
  • fDate
    1-3 Nov. 2007
  • Firstpage
    218
  • Lastpage
    220
  • Abstract
    According to the current security problems of computer terminal and trusted computing goals proposed by Microsoft Corporation, this paper proposes a solution scheme based on trusted computing for terminal security. By means of formal method, it gives some rules to control user´s access to program and data based on its level. Legal programs only can run authorized operation and data file protected by cryptogram based on its level avoiding information leakage. A frame to realize the scheme is also given. And this scheme is described from security and privacy two facets.
  • Keywords
    authorisation; cryptography; authorization; cryptogram; data file protection; information leakage; legal program; terminal security; trusted computing; user access control; Computer security; Data engineering; Data privacy; Data security; Educational institutions; Gold; Information security; Law; Legal factors; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-0-7695-3016-1
  • Type

    conf

  • DOI
    10.1109/ISDPE.2007.111
  • Filename
    4402678