Who Has the Keys to the Vault? Protecting Secrets on Laptops

This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.

Bibliographic Details
Main Author: Armstrong, Helen
Other Authors: -
Format: Conference Paper
Published: IEEE 2004
Online Access:http://hdl.handle.net/20.500.11937/47380
_version_ 1848757817054330880
author Armstrong, Helen
author2 -
author_facet -
Armstrong, Helen
author_sort Armstrong, Helen
building Curtin Institutional Repository
collection Online Access
description This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.
first_indexed 2025-11-14T09:34:07Z
format Conference Paper
id curtin-20.500.11937-47380
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T09:34:07Z
publishDate 2004
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-473802018-03-29T09:07:10Z Who Has the Keys to the Vault? Protecting Secrets on Laptops Armstrong, Helen - This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented. 2004 Conference Paper http://hdl.handle.net/20.500.11937/47380 10.1109/IAW.2004.1437846 IEEE restricted
spellingShingle Armstrong, Helen
Who Has the Keys to the Vault? Protecting Secrets on Laptops
title Who Has the Keys to the Vault? Protecting Secrets on Laptops
title_full Who Has the Keys to the Vault? Protecting Secrets on Laptops
title_fullStr Who Has the Keys to the Vault? Protecting Secrets on Laptops
title_full_unstemmed Who Has the Keys to the Vault? Protecting Secrets on Laptops
title_short Who Has the Keys to the Vault? Protecting Secrets on Laptops
title_sort who has the keys to the vault? protecting secrets on laptops
url http://hdl.handle.net/20.500.11937/47380