Show simple item record

dc.contributor.authorArmstrong, Helen
dc.contributor.editor-
dc.date.accessioned2017-01-30T15:32:57Z
dc.date.available2017-01-30T15:32:57Z
dc.date.created2010-11-17T07:05:00Z
dc.date.issued2004
dc.identifier.citationArmstrong, Helen. 2004. Who Has the Keys to the Vault? Protecting Secrets on Laptops, in - (ed), Fifth Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, Jun 10 2004, pp. 410-415.West Point, New York, USA: IEEE
dc.identifier.urihttp://hdl.handle.net/20.500.11937/47380
dc.identifier.doi10.1109/IAW.2004.1437846
dc.description.abstract

This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.

dc.publisherIEEE
dc.titleWho Has the Keys to the Vault? Protecting Secrets on Laptops
dc.typeConference Paper
dcterms.source.volumeJune
dcterms.source.startPage410
dcterms.source.endPage415
dcterms.source.titleProceedings of the 2004 IEEE Workshop on Information Assurance
dcterms.source.seriesProceedings of the 2004 IEEE Workshop on Information Assurance
dcterms.source.isbn0780385721
dcterms.source.conferenceFifth Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop
dcterms.source.conference-start-dateJun 10 2004
dcterms.source.conferencelocationWest Point, New York, USA
dcterms.source.placeWest Point
curtin.accessStatusFulltext not available
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail
This item appears in the following Collection(s)

Show simple item record