Who Has the Keys to the Vault? Protecting Secrets on Laptops
dc.contributor.author | Armstrong, Helen | |
dc.contributor.editor | - | |
dc.date.accessioned | 2017-01-30T15:32:57Z | |
dc.date.available | 2017-01-30T15:32:57Z | |
dc.date.created | 2010-11-17T07:05:00Z | |
dc.date.issued | 2004 | |
dc.identifier.citation | Armstrong, Helen. 2004. Who Has the Keys to the Vault? Protecting Secrets on Laptops, in - (ed), Fifth Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, Jun 10 2004, pp. 410-415.West Point, New York, USA: IEEE | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/47380 | |
dc.identifier.doi | 10.1109/IAW.2004.1437846 | |
dc.description.abstract |
This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented. | |
dc.publisher | IEEE | |
dc.title | Who Has the Keys to the Vault? Protecting Secrets on Laptops | |
dc.type | Conference Paper | |
dcterms.source.volume | June | |
dcterms.source.startPage | 410 | |
dcterms.source.endPage | 415 | |
dcterms.source.title | Proceedings of the 2004 IEEE Workshop on Information Assurance | |
dcterms.source.series | Proceedings of the 2004 IEEE Workshop on Information Assurance | |
dcterms.source.isbn | 0780385721 | |
dcterms.source.conference | Fifth Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop | |
dcterms.source.conference-start-date | Jun 10 2004 | |
dcterms.source.conferencelocation | West Point, New York, USA | |
dcterms.source.place | West Point | |
curtin.accessStatus | Fulltext not available | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |