Back to Results
First PageMeta Content
National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention


Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel
Add to Reading List

Document Date: 2012-01-11 13:39:10


Open Document

File Size: 269,62 KB

Share Result on Facebook

Company

Brodsky / Transmeta Code Morphing Software / Intel Corporation / EMC Corp. / Adobe Systems Inc. / Microsoft Corp. / /

Country

United States / /

Facility

clinic PCs / /

IndustryTerm

with unmodified applications / arbitrary applications / built expedient solutions / metal / software/information / advertising systems / restrictive solutions / proposed solution / media content protection / social networking / information-flow tracking solutions / similar protocol / web forms / to legacy systems / co-processor / web services / /

OperatingSystem

VMs / Linux / Microsoft Windows / Petros / /

Organization

Congress / UC Berkeley / Open Security Foundation / /

Person

E. Witchel / A. Datta / V / D. E. Porter / M. D. Bond / Dawn Song / Kevin Fall / K. S. McKinley / Stephen McCamant / Elaine Shi / /

Position

Authentication Manager / CTO / Capsule Manager / commodity appli2 Authentication Manager / cio / representative / auth Application D2 Policy Engine Crypto Engine Capsule Manager / Porter / /

Product

Secure Data Capsules / The Secure Data Capsules / Application D2 Policy Engine Crypto Engine Capsule / /

PublishedMedium

Public Law / /

Technology

virtual machine / cryptography / Flow Control / Linux / PKI / Crusoe / http / caching / Operating System / operating systems / similar protocol / MRI / /

URL

http /

SocialTag