Downloads: 125 | Views: 290
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.3 / 10
Launch Time Application Security: The Trusted Approach
Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.
Abstract: In the day to day lives of human beings commodity computers are increasingly used to access banking transactions, sending sensitive e-mails, accessing personal and confidential information from remote systems, where it becomes the prime necessity to assure the user that security sensitive operations executes always on secure and trusted state of system. The emergence of the Trusted Platform Module (TPM) has added to the security feature of a computer. Much work has been done to ensure the integrity of the system using a TPM. But what happens when the applications running on top of the Trusted System are malicious? The sensitive data provided to such applications becomes vulnerable for exploit. We propose a system which notifies the user if the integrity of an application is violated and stops it. The system makes use of the functionalities of the TPM chip.
Keywords: Trust, Trusted Platform Module, TPM, Integrity Measurement, Sealing, Application Security
Edition: Volume 2 Issue 3, March 2013
Pages: 168 - 172
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 672 - 675Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio
Shashank Dhananjaya, Yuvaraju B N
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 625 - 633Ridesharing DApps - A Study on Peer-to-Peer Ridesharing on Ethereum
Tushar S Menon, Aviral Srivastava, Aditya, Dr. Radhika K R