DocumentCode
2382136
Title
A Scheme Based on Trusted Computing for Terminal Security
Author
Zhang, Jun ; Zhou, Zheng ; Liu, Wei-peng ; Li, Jian
Author_Institution
Naval Univ. of Eng., Wuhan
fYear
2007
fDate
1-3 Nov. 2007
Firstpage
218
Lastpage
220
Abstract
According to the current security problems of computer terminal and trusted computing goals proposed by Microsoft Corporation, this paper proposes a solution scheme based on trusted computing for terminal security. By means of formal method, it gives some rules to control user´s access to program and data based on its level. Legal programs only can run authorized operation and data file protected by cryptogram based on its level avoiding information leakage. A frame to realize the scheme is also given. And this scheme is described from security and privacy two facets.
Keywords
authorisation; cryptography; authorization; cryptogram; data file protection; information leakage; legal program; terminal security; trusted computing; user access control; Computer security; Data engineering; Data privacy; Data security; Educational institutions; Gold; Information security; Law; Legal factors; Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Conference_Location
Chengdu
Print_ISBN
978-0-7695-3016-1
Type
conf
DOI
10.1109/ISDPE.2007.111
Filename
4402678
Link To Document