A SECURITY MODEL TO PROTECT SENSITIVE INFORMATION FLOWS BASED ON TRUSTED COMPUTING TECHNOLOGIES
The sensitive information leakage accidents due to insiders were always troublesome. Based on trusted computing technologies the paper designs a model called Secure Information Flows Control Model ( SIFCM for short) that will be applied in sensitive organizations. SIKCM protects sensitive information by encrypting any sensitive information flowing out of the system and guaranteeing the confidentiality of sensitive information against decryption outside the system boundary. The model is based on the hardware protection capability of trusted computing to prevent the keys from being obtained by unauthorized persons.
Trusted computing Information security Cryptography Key management Information flow control
SHI-HUA WANG XIAO-YONG LI
Department of Information Security, College of Mathematics, Sichuan University, Chengdu, 610065, Chi Information Security Architecture Center, Beijing Jiaotong University, Beijing 100044, China
国际会议
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
昆明
英文
3646-3650
2008-07-12(万方平台首次上网日期,不代表论文的发表时间)