Who Has the Keys to the Vault? Protecting Secrets on Laptops
This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented.
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE
2004
|
| Online Access: | http://hdl.handle.net/20.500.11937/47380 |
| _version_ | 1848757817054330880 |
|---|---|
| author | Armstrong, Helen |
| author2 | - |
| author_facet | - Armstrong, Helen |
| author_sort | Armstrong, Helen |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented. |
| first_indexed | 2025-11-14T09:34:07Z |
| format | Conference Paper |
| id | curtin-20.500.11937-47380 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T09:34:07Z |
| publishDate | 2004 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-473802018-03-29T09:07:10Z Who Has the Keys to the Vault? Protecting Secrets on Laptops Armstrong, Helen - This paper discusses the security of data on laptops and produces a model for the partitioning and encryption of sensitive data. An overview of a solution based upon this model encompassing encryption, user authentication and access control is also presented. 2004 Conference Paper http://hdl.handle.net/20.500.11937/47380 10.1109/IAW.2004.1437846 IEEE restricted |
| spellingShingle | Armstrong, Helen Who Has the Keys to the Vault? Protecting Secrets on Laptops |
| title | Who Has the Keys to the Vault? Protecting Secrets on Laptops |
| title_full | Who Has the Keys to the Vault? Protecting Secrets on Laptops |
| title_fullStr | Who Has the Keys to the Vault? Protecting Secrets on Laptops |
| title_full_unstemmed | Who Has the Keys to the Vault? Protecting Secrets on Laptops |
| title_short | Who Has the Keys to the Vault? Protecting Secrets on Laptops |
| title_sort | who has the keys to the vault? protecting secrets on laptops |
| url | http://hdl.handle.net/20.500.11937/47380 |