DocumentCode :
3309063
Title :
Who has the keys to the vault? Protecting secrets on Laptops
Author :
Armstrong, Helen ; Wynne, Mike ; O´Shea, Tony
Author_Institution :
Curtin Univ., Australia
fYear :
2004
fDate :
10-11 June 2004
Firstpage :
410
Lastpage :
415
Abstract :
This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.
Keywords :
authorisation; cryptography; laptop computers; message authentication; access control; data encryption; laptop security; security of data; user authentication; Australia; Authentication; Computer security; Cryptography; Data security; Government; Information security; Military computing; Portable computers; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN :
0-7803-8572-1
Type :
conf
DOI :
10.1109/IAW.2004.1437846
Filename :
1437846
Link To Document :
بازگشت