메뉴 건너뛰기




Volumn , Issue , 2007, Pages 67-73

Information protection via environmental data tethers

Author keywords

Authorization; Data security

Indexed keywords

CONFIDENTIAL DATA; DATA EXPOSURE; DATA PROTECTION; DATA SECURITY; DATA-PROTECTION STRATEGY; ENVIRONMENTAL DATA; ENVIRONMENTAL FACTORS; INFORMATION PROTECTION; SENSITIVE DATAS;

EID: 70450228476     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1600176.1600188     Document Type: Conference Paper
Times cited : (3)

References (41)
  • 2
    • 70450286023 scopus 로고    scopus 로고
    • Marine base seeks missing laptop
    • Oct
    • Marine base seeks missing laptop. Associated Press, Oct 2006.
    • (2006) Associated Press
  • 3
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • Feb
    • D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. NDSS, Feb 2002.
    • (2002) Proc. NDSS
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.C.4
  • 4
    • 0027764777 scopus 로고
    • A cryptographic file system for UNIX
    • Nov
    • M. Blaze. A cryptographic file system for UNIX. In Proc. CCS, pages 9-16, Nov 1993.
    • (1993) Proc. CCS , pp. 9-16
    • Blaze, M.1
  • 5
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • Mar
    • S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proc. INFOCOM, pages 1917-1928, Mar 2005.
    • (2005) Proc. INFOCOM , pp. 1917-1928
    • Capkun, S.1    Hubaux, J.-P.2
  • 6
    • 33144454801 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • Feb
    • S. Capkun and J.-P. Hubaux. Secure positioning in wireless networks. JSAC, 24(2):221-232, Feb 2006.
    • (2006) JSAC , vol.24 , Issue.2 , pp. 221-232
    • Capkun, S.1    Hubaux, J.-P.2
  • 7
    • 70450266273 scopus 로고    scopus 로고
    • Cisco Systems. Cisco Network Admission Control (NAC) solution executive overview. http://www.cisco.com/application/pdf/en/us/guest/netsol/ns466/c654/ cdccont-0900aecd80557152.pdf, 2006. Visited 2007/5/4.
    • Cisco Systems. Cisco Network Admission Control (NAC) solution executive overview. http://www.cisco.com/application/pdf/en/us/guest/netsol/ns466/c654/ cdccont-0900aecd80557152.pdf, 2006. Visited 2007/5/4.
  • 8
    • 0036949148 scopus 로고    scopus 로고
    • Zero-Interaction Authentication
    • Sep
    • M. D. Corner and B. D. Noble. Zero-Interaction Authentication. In Proc. MOBICOM, pages 1-11, Sep 2002.
    • (2002) Proc. MOBICOM , pp. 1-11
    • Corner, M.D.1    Noble, B.D.2
  • 10
    • 84944048132 scopus 로고    scopus 로고
    • The Ponder policy specification language
    • Proc. Policies for Distributed Systems and Networks, Jan
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder policy specification language. In Proc. Policies for Distributed Systems and Networks, LNCS, pages 18-39, Jan 2001.
    • (2001) LNCS , pp. 18-39
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 11
    • 70450250870 scopus 로고    scopus 로고
    • M. Dornseif, M. Becker, and C. N. Klein. FireWire: All of your memory are belong to us. http://md.hudora.de/presentations/firewire/2005-firewire- cansecwest.pdf, May 2005. Visited 2007/5/4.
    • M. Dornseif, M. Becker, and C. N. Klein. FireWire: All of your memory are belong to us. http://md.hudora.de/presentations/firewire/2005-firewire- cansecwest.pdf, May 2005. Visited 2007/5/4.
  • 12
    • 70450249212 scopus 로고    scopus 로고
    • Posture-Based Data Protection
    • Technical report, PARC, 2007
    • G. Durfee, D. K. Smetters, and D. Balfanz. Posture-Based Data Protection. Technical report, PARC, 2007.
    • Durfee, G.1    Smetters, D.K.2    Balfanz, D.3
  • 14
    • 70450240366 scopus 로고    scopus 로고
    • WiFi nomads and their unprotected devices: The case for Quarantine, Examination, and Decontamination
    • Aug
    • K. Eustice, V. Ramakrishna, S. Markstrum, P. Reiher, and G. Popek. WiFi nomads and their unprotected devices: The case for Quarantine, Examination, and Decontamination. In Proc. NSPW, pages 123-128, Aug 2003.
    • (2003) Proc. NSPW , pp. 123-128
    • Eustice, K.1    Ramakrishna, V.2    Markstrum, S.3    Reiher, P.4    Popek, G.5
  • 16
    • 70450268222 scopus 로고    scopus 로고
    • Infosecurity Europe. Two thirds of workers reveal passwords for chocolate and a pretty smile. http://www.infosec.co.uk/page.cfm/Action=Press/PressID=640, Apr 2007. Visited 2007/5/4.
    • Infosecurity Europe. Two thirds of workers reveal passwords for chocolate and a pretty smile. http://www.infosec.co.uk/page.cfm/Action=Press/PressID=640, Apr 2007. Visited 2007/5/4.
  • 17
    • 70450249213 scopus 로고    scopus 로고
    • Afghan market sells US military flash drives
    • Apr
    • J. Leyden. Afghan market sells US military flash drives. The Register, Apr 2006.
    • (2006) The Register
    • Leyden, J.1
  • 19
    • 79957608179 scopus 로고    scopus 로고
    • McAfee. Data Loss Prevention. http://www.mcafee.com/us/enterprise/ products/data-loss-prevention/. Visited 2007/10/29.
    • Data Loss Prevention
  • 20
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • May
    • J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. Symposium on Security and Privacy, pages 110-124, May 2005.
    • (2005) Proc. Symposium on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 22
    • 70450228109 scopus 로고    scopus 로고
    • The Autokey security architecture, protocol and algorithms
    • Technical Report 06-1-1, University of Delaware Electrical and Computer Engineering, January
    • D. L. Mills. The Autokey security architecture, protocol and algorithms. Technical Report 06-1-1, University of Delaware Electrical and Computer Engineering, January 2006.
    • (2006)
    • Mills, D.L.1
  • 24
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • January
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. POPL, pages 228-241, January 1999.
    • (1999) Proc. POPL , pp. 228-241
    • Myers, A.C.1
  • 25
    • 33845953872 scopus 로고    scopus 로고
    • National Security Agency
    • National Security Agency. Security-Enhanced Linux. http://www.nsa.gov/ selinux/. Visited 2007/5/4.
    • Security-Enhanced Linux
  • 27
    • 84869674864 scopus 로고    scopus 로고
    • Reconnex. http://www.reconnnex.net/. Visited 2007/10/29.
    • Reconnex
  • 28
    • 70450234263 scopus 로고    scopus 로고
    • Boeing laptop with data on 382,000 employees stolen
    • Dec
    • L. Rosencrance. Boeing laptop with data on 382,000 employees stolen. Computerworld, Dec 2006.
    • (2006) Computerworld
    • Rosencrance, L.1
  • 29
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sep
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. of the IEEE, 63(9):1278-1308, Sep 1975.
    • (1975) Proc. of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 30
    • 70450259382 scopus 로고    scopus 로고
    • FBI eyes contractor in Los Alamos leak
    • Oct
    • J. Seper. FBI eyes contractor in Los Alamos leak. The Washington Times, Oct 2006.
    • (2006) The Washington Times
    • Seper, J.1
  • 31
    • 84947251443 scopus 로고    scopus 로고
    • F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. International Workshop on Security Protocols, LNCS, pages 172-182, 1999.
    • F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. International Workshop on Security Protocols, LNCS, pages 172-182, 1999.
  • 33
    • 84869682430 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group. https://www.trustedcomputinggroup.org/. Visited 2007/5/4.
  • 34
    • 84869684409 scopus 로고    scopus 로고
    • Verdasys. Digital Guardian. http://www.verdasys.com/digital-guardian.php. Visited 2007/10/29.
    • Digital Guardian
  • 35
    • 84869667815 scopus 로고    scopus 로고
    • Vontu. http://www.vontu.com/. Visited 2007/10/29.
    • Vontu
  • 37
    • 84869673974 scopus 로고    scopus 로고
    • Websense. Content Protection Suite. http://www.websense.com/global/en/ ProductsServices/CPS/. Visited 2007/10/29.
    • Content Protection Suite
  • 38
    • 70450256503 scopus 로고    scopus 로고
    • R.-P. Weinman and J. Appelbaum. Unlocking FileVault: An analysis of Apple's disk encryption system. http://events.ccc.de/congress/2006/Fahrplan/ attachments/1244-23C3VileFault.pdf, Dec 2006. Visited 2007/5/4.
    • R.-P. Weinman and J. Appelbaum. Unlocking FileVault: An analysis of Apple's disk encryption system. http://events.ccc.de/congress/2006/Fahrplan/ attachments/1244-23C3VileFault.pdf, Dec 2006. Visited 2007/5/4.
  • 39
    • 84948183524 scopus 로고    scopus 로고
    • Cryptographic file systems performance: What you don't know can hurt you
    • Oct
    • C. P. Wright, J. Dave, and E. Zadok. Cryptographic file systems performance: What you don't know can hurt you. In Proc. Security in Storage Workshop, pages 47+, Oct 2003.
    • (2003) Proc. Security in Storage Workshop
    • Wright, C.P.1    Dave, J.2    Zadok, E.3
  • 40
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • August
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proc. USENIX Security, pages 121-136, August 2006.
    • (2006) Proc. USENIX Security , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.