Personal Secure Booting

ثبت نشده
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Personal Firewalls and Intrusion Detection Systems

In this paper we explore how secure coprocessors can be used to secure client devices, especially mobile clients such as notebook computers. The goal is to protect data on the mobile client in case of theft, and to adapt the client's protection to the working environment --such as the Intranet or Internet-without relying completely on the integrity of the client. We show how physically secure c...

متن کامل

Security Technology for Smartphones

Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate information, and so on. Most smartphones use an open source operating system (OS), and anyone can obtain the OS source code; consequently, smartphone users are exposed to the threat of receiving fraudulent information from people with malicious intent. Aimed at count...

متن کامل

Secure and Manageable Virtual Private Networks for End-users

This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environment called a portspace is bound to only one VPN, i.e., single-homed. Using this feature of portspaces, personal networks address several problems at multi-homed hosts that use multiple VPNs. Information flow is separat...

متن کامل

A Case Study of Secure ATM Switch Booting

This paper examines a few techniques in booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi service network where ATM switches are booted with third party software, using a thi...

متن کامل

Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks

Identity theft through phishing attacks has fostered to a major concern of Internet users. Classical phishing attacks aim at luring the user to a faked web site to disclose personal information. Various solutions have been proposed against this kind of attack. However, these solutions can hardly counter the new generation of sophisticated malware phishing attacks designed to target certain serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001