메뉴 건너뛰기




Volumn , Issue , 2006, Pages 54-63

Security architecture for device encryption and VPN

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC KEY; ENCRYPTION SYSTEM; ENTERPRISE RIGHTS MANAGEMENT; ON-LINE BANKING; SECURITY ARCHITECTURE; SECURITY-CRITICAL; TRUSTED COMPUTING; UNAUTHORIZED ACCESS;

EID: 84883020601     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-8348-9195-2_7     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 1
    • 84882951820 scopus 로고    scopus 로고
    • Adva06, Inc
    • [Adva06] Advanced Micro Devices, Inc.: Amd virtualization solutions. http://enterprise.amd.com/us-en/Solutions/Consolidation/virtualization.aspx, 2006.
    • (2006) Amd Virtualization Solutions
  • 2
    • 84882943400 scopus 로고    scopus 로고
    • Cisc04, fips release 3.6.7
    • [Cisc04] Cisco Systems, Inc: Cisco vpn client security policy, fips release 3.6.7. http://cco.cisco.com/en/US/products/sw/secursw/ps2308/prod- configuration-guide09186a00802218e3.html, 2004.
    • (2004) Cisco Vpn Client Security Policy
  • 3
    • 84882981382 scopus 로고    scopus 로고
    • Cisc05
    • [Cisc05] Cisco Systems, Inc: Cisco vpn client data sheet. http://cco.cisco.com/en/US/products/sw/secursw/ps2308/products-data- sheet0900aecd801a9de9.html, 2005.
    • (2005) Cisco Vpn Client Data Sheet
  • 9
    • 21644470487 scopus 로고    scopus 로고
    • Experimenting with tcpa/tcg hardware, or: How i learned to stop worrying and love the bear
    • MSWM03, December
    • [MSWM03] Marchesini, J., Smith, S., Wild, O., and MacDonald, R.: Experimenting with tcpa/tcg hardware, or: How i learned to stop worrying and love the bear. Technical report, Dartmouth College, December 2003.
    • (2003) Technical Report, Dartmouth College
    • Marchesini, J.1    Smith, S.2    Wild, O.3    MacDonald, R.4
  • 14
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • SZJv04, San Diego, California, August
    • [SZJv04] Sailer, R., Zhang, X., Jaeger, T., and van Doom, L.: Design and implementation of a tcg-based integrity measurement architecture. 13th Usenix Security Symposium, San Diego, California, August 2004.
    • (2004) 13th Usenix Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doom, L.4
  • 16
    • 84882933710 scopus 로고    scopus 로고
    • University of Cambridge Computer Laboratory, Univ06
    • [Univ06] University of Cambridge Computer Laboratory: Xen virtual machinemonitor. http://www.cl.cam.ac.uk/Researcli/SRG/netos/xen, 2006.
    • (2006) Xen Virtual Machinemonitor
  • 17
    • 0003969633 scopus 로고
    • USDe85, US Department of Defense:, (orange book)., December
    • [USDe85] US Department of Defense: Trusted computer system evaluation criteria (orange book). http://www.kemel.org/pub/linux/libs/security/Orange- Linux/refs/Orange/OrangeO-5.html, December 1985.
    • (1985) Trusted Computer System Evaluation Criteria


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.