Computer
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Better Security via Smarter Devices
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
IEEE Security and Privacy
Trusted computing and provenance: better together
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Features and benefits of trusted computing
2009 Information Security Curriculum Development Conference
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Disk drives and other intelligent peripherals are critical to security, privacy, and trust inthecomputing infrastructure. This article proposes a framework to describe why and how these peripheraldevices can be secured as independent roots of trust.