Problems with DCE security services
ACM SIGCOMM Computer Communication Review
JavaScript: developer's resource
JavaScript: developer's resource
Authentication: from passwords to public keys
Authentication: from passwords to public keys
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Essential Xhtml Fast: Creating Dynamic Web Sites with Xhtml and Javascript
Essential Xhtml Fast: Creating Dynamic Web Sites with Xhtml and Javascript
Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems
RSP '01 Proceedings of the 12th International Workshop on Rapid System Prototyping
Modeling and detecting the cascade vulnerability problem using soft constraints
Proceedings of the 2004 ACM symposium on Applied computing
Design of the EROS trusted window system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Hi-index | 0.00 |
Protecting sensitive information (credit card information, social security number ...etc) and copyrighted materials (images, e-books, videos...etc) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulous hands. Despite tremendous advances in security, plenty of security problems still afflict systems. Also existing security approaches do not prevent processes running in the background from capturing sensitive information on the screen. This paper introduces three security levels that can be used to protect sensitive information and copyrighted materials. First level (low security) prevents capturing of sensitive data by users that do not have administration privileges. Second level (medium security) protects many attacks such as replacing the display driver. For the third level (high security), the paper proposes a no-capture hardware security feature and uses this feature for designing the third security level that prevents capturing of sensitive data by users that have administration privileges.