Who Has the Keys to the Vault? Protecting Secrets on Laptops
This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE
2004
|
| Online Access: | http://hdl.handle.net/20.500.11937/47380 |