Personal Secure Booting
dc.contributor.author | Itoi, Naomaru | en_US |
dc.contributor.author | Arbaugh, William A. | en_US |
dc.contributor.author | Pollack, Samuela J. | en_US |
dc.contributor.author | Reeves, Daniel M. | en_US |
dc.date.accessioned | 2014-07-18T18:11:50Z | |
dc.date.available | 2014-07-18T18:11:50Z | |
dc.date.issued | 2001-05-14 | en_US |
dc.identifier.citation | Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, and Daniel M. Reeves, "Personal Secure Booting," May 2001. [ACISP 2001, Sydney, Australia (July 2001)] <http://hdl.handle.net/2027.42/107894> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107894 | |
dc.description.abstract | With the majority of security breaches coming from inside of organizations, and with the number of public computing sites, where users do not know the system administrators, increasing, it is dangerous to blindly trust system administrators to manage computers appropriately. However, most current security systems are vulnerable to malicious software modification by administrators. To solve this problem, we have developed a system called sAEGIS, which embraces a smart card as personal secure storage for computer component hashes, and uses the hashes in a secure booting process to ensure the integrity of the computer components. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Personal Secure Booting | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationother | Department of Computer Science, University of Maryland, College Park [2nd listed author] | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107894/1/citi-tr-01-8.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.