메뉴 건너뛰기




Volumn , Issue , 2010, Pages 231-240

Kells: A protection framework for portable data

Author keywords

[No Author keywords available]

Indexed keywords

SENSITIVE DATA; VIRTUAL STORAGE;

EID: 78751542940     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920296     Document Type: Conference Paper
Times cited : (21)

References (40)
  • 1
    • 85170002460 scopus 로고    scopus 로고
    • IronKey. http://www.ironkey.com, 2009.
    • (2009) IronKey
  • 5
    • 85029533838 scopus 로고    scopus 로고
    • On the difficulty of software-based attestation of embedded devices
    • Nov.
    • C. Castelluccia, A. Francillon, D. Perito, and C. Soriente. On the difficulty of software-based attestation of embedded devices. In ACM CCS, Nov. 2008.
    • (2008) ACM CCS
    • Castelluccia, C.1    Francillon, A.2    Perito, D.3    Soriente, C.4
  • 7
    • 0035474388 scopus 로고    scopus 로고
    • Building the IBM 4758 Secure Coprocessor
    • Oct.
    • J. G. Dyer, M. Lindermann, R. Perez, et al. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 39(10):57-66, Oct. 2001.
    • (2001) IEEE Computer , vol.39 , Issue.10 , pp. 57-66
    • Dyer, J.G.1    Lindermann, M.2    Perez, R.3
  • 8
    • 0020778471 scopus 로고
    • Scomp: A solution to the multilevel security problem
    • July
    • L. J. Fraim. Scomp: A solution to the multilevel security problem. IEEE Computer, 16(7):26-34, July 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 26-34
    • Fraim, L.J.1
  • 9
    • 85170008984 scopus 로고    scopus 로고
    • On the difficulty of validating voting machine software with software
    • Aug.
    • R. Gardner, S. Garera, and A. D. Rubin. On the difficulty of validating voting machine software with software. In USENIX EVT, Aug. 2007.
    • (2007) USENIX EVT
    • Gardner, R.1    Garera, S.2    Rubin, A.D.3
  • 11
    • 0031611082 scopus 로고    scopus 로고
    • A Cost-Effective, High-Bandwidth Storage Architecture
    • G. A. Gibson, D. F. Nagle, K. Amiri, et al. A Cost-Effective, High-Bandwidth Storage Architecture. In ASPLOS, 1998.
    • (1998) ASPLOS
    • Gibson, G.A.1    Nagle, D.F.2    Amiri, K.3
  • 12
    • 78751519878 scopus 로고
    • Security Pipeline Interface (SPI)
    • Dec.
    • L. J. Hoffman and R. J. Davis. Security Pipeline Interface (SPI). In ACSAC, Dec. 1990.
    • (1990) ACSAC
    • Hoffman, L.J.1    Davis, R.J.2
  • 16
    • 85170016500 scopus 로고    scopus 로고
    • Security tightened as secretary blamed for patient data loss
    • 4 June
    • C. Lomax. Security tightened as secretary blamed for patient data loss. Telegraph & Argus, 4 June 2009.
    • (2009) Telegraph & Argus
    • Lomax, C.1
  • 17
    • 84894902184 scopus 로고    scopus 로고
    • Turtles all the way down: Research challenges in user-based attestation
    • Aug.
    • J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn. Turtles all the way down: Research challenges in user-based attestation. In USENIX HotSec, Aug. 2007.
    • (2007) USENIX HotSec
    • McCune, J.M.1    Perrig, A.2    Seshadri, A.3    Van Doorn, L.4
  • 18
    • 85170014571 scopus 로고    scopus 로고
    • Jan.
    • Microsoft. BitLocker and BitLocker to Go. http://technet.microsoft.com/ en-us/windows/dd408739.aspx, Jan. 2009.
    • (2009) BitLocker and BitLocker to Go
  • 20
    • 85052678926 scopus 로고    scopus 로고
    • Bootstrapping trust in a "trusted" platform
    • Aug.
    • B. Parno. Bootstrapping trust in a "trusted" platform. In USENIX HotSec, Aug. 2008.
    • (2008) USENIX HotSec
    • Parno, B.1
  • 24
    • 85170008195 scopus 로고    scopus 로고
    • SanDisk. SanDisk Cruzer Enterprise. http://www.sandisk.com/business- solutions/enterprise, 2009.
    • (2009) SanDisk Cruzer Enterprise
  • 26
    • 84885617227 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • A. Seshadri, M. Luk, E. Shi, et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In ACM SOSP, 2005.
    • (2005) ACM SOSP
    • Seshadri, A.1    Luk, M.2    Shi, E.3
  • 28
    • 78751499359 scopus 로고    scopus 로고
    • Under Worm Assault, Military Bans Disks, USB Drives
    • Nov.
    • N. Shachtman. Under Worm Assault, Military Bans Disks, USB Drives. Wired, Nov. 2008.
    • (2008) Wired
    • Shachtman, N.1
  • 31
    • 12344286486 scopus 로고    scopus 로고
    • Cost profile of a highly assured, secure operating system
    • R. E. Smith. Cost profile of a highly assured, secure operating system. ACM Trans. Inf. Syst. Secur., 4(1):72-101, 2001.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.1 , pp. 72-101
    • Smith, R.E.1
  • 32
    • 85170014831 scopus 로고    scopus 로고
    • SRN Microsystems. Trojan.adware.win32.agent.bz. http://www.srnmicro.com/ virusinfo/trj10368.htm, 2009.
    • (2009) Trojan.adware.win32.agent.bz
  • 33
    • 48649110347 scopus 로고    scopus 로고
    • Establishing and Sustaining System Integrity via Root of Trust Installation
    • L. St. Clair, J. Schiffman, T. Jaeger, and P. McDaniel. Establishing and Sustaining System Integrity via Root of Trust Installation. In ACSAC, 2007.
    • (2007) ACSAC
    • St. Clair, L.1    Schiffman, J.2    Jaeger, T.3    McDaniel, P.4
  • 34
    • 84995392884 scopus 로고    scopus 로고
    • Self-Securing Storage: Protecting Data in Compromised Systems
    • J. Strunk, G. Goodson, M. Scheinholtz, et al. Self-Securing Storage: Protecting Data in Compromised Systems. In USENIX OSDI, 2000.
    • (2000) USENIX OSDI
    • Strunk, J.1    Goodson, G.2    Scheinholtz, M.3
  • 35
  • 36
    • 70749096362 scopus 로고    scopus 로고
    • TCG. Specification Version 1.2, Level 2 Revision 103. TCG, July
    • TCG. TPM Main: Part 1 - Design Principles. Specification Version 1.2, Level 2 Revision 103. TCG, July 2007.
    • (2007) TPM Main: Part 1 - Design Principles
  • 37
    • 78649981929 scopus 로고    scopus 로고
    • TCG. Specification Version 1.0, Revision 1.0. Trusted Computing Group, Jan.
    • TCG. TCG Storage Security Subsystem Class: Opal. Specification Version 1.0, Revision 1.0. Trusted Computing Group, Jan. 2009.
    • (2009) TCG Storage Security Subsystem Class: Opal
  • 38
    • 85170008163 scopus 로고    scopus 로고
    • The Zurich Trusted Information Channel - An Efficient Defence against Man-in-the-Middle and Malicious Software Attacks
    • T. Weigold, T. Kramp, R. Hermann, et al. The Zurich Trusted Information Channel - An Efficient Defence against Man-in-the-Middle and Malicious Software Attacks. In Proc. TRUST, Villach, Austria, Mar. 2008.
    • Proc. TRUST, Villach, Austria, Mar. 2008
    • Weigold, T.1    Kramp, T.2    Hermann, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.