Show simple item record

Personal Secure Booting

dc.contributor.authorItoi, Naomaruen_US
dc.contributor.authorArbaugh, William A.en_US
dc.contributor.authorPollack, Samuela J.en_US
dc.contributor.authorReeves, Daniel M.en_US
dc.date.accessioned2014-07-18T18:11:50Z
dc.date.available2014-07-18T18:11:50Z
dc.date.issued2001-05-14en_US
dc.identifier.citationNaomaru Itoi, William A. Arbaugh, Samuela J. Pollack, and Daniel M. Reeves, "Personal Secure Booting," May 2001. [ACISP 2001, Sydney, Australia (July 2001)] <http://hdl.handle.net/2027.42/107894>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/107894
dc.description.abstractWith the majority of security breaches coming from inside of organizations, and with the number of public computing sites, where users do not know the system administrators, increasing, it is dangerous to blindly trust system administrators to manage computers appropriately. However, most current security systems are vulnerable to malicious software modification by administrators. To solve this problem, we have developed a system called sAEGIS, which embraces a smart card as personal secure storage for computer component hashes, and uses the hashes in a secure booting process to ensure the integrity of the computer components.en_US
dc.publisherCenter for Information Technology Integrationen_US
dc.titlePersonal Secure Bootingen_US
dc.typeTechnical Reporten_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.contributor.affiliationotherDepartment of Computer Science, University of Maryland, College Park [2nd listed author]en_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/107894/1/citi-tr-01-8.pdf
dc.owningcollnameElectrical Engineering and Computer Science, Department of (EECS)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.