PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Drive Encryption and Secure Login to a Secure Workstation for Special Applications

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
We discuss the problem of a secure login to a virtualized workstation. For increased security, the workstation's hard drive is encrypted. During the startup, a decryption password to the drive must be entered by a user. We propose a solution that involves mutual authentication between the workstation and the user and ensures the password may be entered securely.
Słowa kluczowe
Rocznik
Tom
Strony
58--63
Opis fizyczny
Bibliogr. 19 poz., rys., tab.
Twórcy
autor
autor
Bibliografia
  • [1] “Xen” [Online]. Available: http://xen.org/
  • [2] “Kernel Based Virtual Machine” [Online]. Available: http://www.linux-kvm.org/page/Main Page
  • [3] “Dm-crypt” [Online]. Available: http://www.saout.de/misc/dm-crypt/
  • [4] “LUKS + dm-crypt” [Online]. Available: http://code.google.com/p/cryptsetup/
  • [5] “TrueCrypt” [Online]. Available: http://www.truecrypt.org/
  • [6] “eCryptfs” [Online]. Available: http://launchpad.net/ecryptfs
  • [7] “The Invisible Things Lab’s blog: Joanna Rutkowska: Evil Maid goes after TrueCrypt!” [Online]. Available: http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-aftertruecrypt.html
  • [8] “The Invisible Things Lab’s blog: Joanna Rutkowska on Anti-Evil Maid” [Online]. Available: http://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html
  • [9] “Initramfs” [Online]. Available: http://en.gentoo-wiki.com/wiki/Initramfs
  • [10] “Trusted Computing Group, TPM Main Specifications” [Online]. Available: http://www.trustedcomputinggroup.org/resources/tpm main specification
  • [11] “Trusted Computing: TCG proposals” [Online]. Available: http://www.cs.bham.ac.uk/_mdr/teaching/modules/security/lectures/TrustedComputingTCG.html
  • [12] “Plymouth” [Online]. Available: http://www.freedesktop.org/wiki/Software/Plymouth
  • [13] “Dracut” [Online]. Available: https://dracut.wiki.kernel.org/index.php/Main Page
  • [14] “TrustedGRUB – How does it work?” [Online]. Available: http://projects.sirrix.com/trac/trustedgrub/wiki/HowDoesItWork
  • [15] “TrouSerS: The open-source TCG Software Stack” [Online]. Available: http://trousers.sourceforge.net/
  • [16] “The H Security – Hacker extracts crypto key from TPM chip”, 10 Feb. 2010 [Online]. Available: http://www.h-online.com/security/news/item/Hacker-extracts-crypto-key-from-TPMchip-927077.html
  • [17] K. D. Mitnick, W. L. Simon, The art of Deception: Controlling the Human Element of Security. Wiley, 2002.
  • [18] “Bruce Schneier’s blog: Schneier on Security: Evil Maid Attacks on Encrypted Hard Drives” [Online]. Available: http://www.schneier.com/blog/archives/2009/10/evil maid attac.html
  • [19] “Joanna Rutkowska: Anti-Evil Maid installation script” [Online]. Available: http://git.qubes-os.org/?p=joanna/antievilmaid.git;a=blob;f=antievilmaid install
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0017-0007
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.