Who Has the Keys to the Vault? Protecting Secrets on Laptops
Access Status
Fulltext not available
Authors
Armstrong, Helen
Date
2004Type
Conference Paper
Metadata
Show full item recordCitation
Armstrong, Helen. 2004. Who Has the Keys to the Vault? Protecting Secrets on Laptops, in - (ed), Fifth Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, Jun 10 2004, pp. 410-415.West Point, New York, USA: IEEE
Source Title
Proceedings of the 2004 IEEE Workshop on Information Assurance
Source Conference
Fifth Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop
ISBN
Faculty
Curtin Business School
School of Information Systems
Collection
Abstract
This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.