Back to Results
First PageMeta Content
National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention


Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel
Add to Reading List

Document Date: 2015-03-02 02:58:50


Open Document

File Size: 281,37 KB

Share Result on Facebook

Company

Brodsky / Transmeta Code Morphing Software / Intel Corporation / EMC Corp. / Adobe Systems Inc. / Microsoft Corp. / /

Country

United States / /

Facility

clinic PCs / /

IndustryTerm

with unmodified applications / arbitrary applications / built expedient solutions / metal / advertising systems / restrictive solutions / proposed solution / media content protection / social networking / information-flow tracking solutions / similar protocol / web forms / to legacy systems / software/information-rights-management.htm / co-processor / web services / /

OperatingSystem

VMs / Linux / Microsoft Windows / Petros / /

Organization

Congress / office of Naval Research / National Science Foundation / UC Berkeley / Air Force office of Scientific Research / Open Security Foundation / /

Person

E. Witchel / A. Datta / V / D. E. Porter / M. D. Bond / Dawn Song / Kevin Fall / K. S. McKinley / Stephen McCamant / Elaine Shi / /

Position

Authentication Manager / CTO / Capsule Manager / commodity appli2 Authentication Manager / representative / auth Application D2 Policy Engine Crypto Engine Capsule Manager / Porter / /

Product

Secure Data Capsules / The Secure Data Capsules / Application D2 Policy Engine Crypto Engine Capsule / /

PublishedMedium

Public Law / /

Technology

virtual machine / cryptography / Flow Control / Linux / PKI / Crusoe / http / caching / Operating System / html / operating systems / similar protocol / MRI / /

URL

http /

SocialTag