TITLE

Protecting Enterprise Data on Mobile Systems with Trusted Computing

AUTHOR(S)
Berger, Brian
PUB. DATE
March 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p70
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article describes three security specifications for data protection on mobile computing and mobile communication systems developed by Trusted Computing Group. The Trusted Platform Module is a hardware building block for laptop computers and servers while the Trusted Network Connect focuses on enterprise computer networks and information networks. The Mobile Trusted Module provides authentication.
ACCESSION #
24529634

 

Related Articles

  • FINGERTIP SECURITY. Allan, Anthony // Computer Weekly;4/25/2006, p50 

    The article presents views of the author on the Trusted Platform Module (TPM), managed by the Trusted Computing Group for securing mobile devices. Since they are outside the reach of normal corporate information technology administration, mobile devices are prone to attack. One of the ways...

  • Embarcing MOBILITY. Sheinis, Richard // Hospitality Upgrade;Summer2013, p158 

    The article offers tips for companies to capitalize on mobile computing while minimizing data security issues. These tips include determining the type of mobile program that is the most suitable for the firm, taking mobile security seriously, and writing an employee agreement that details all...

  • SafeBoot.  // SC Magazine: For IT Security Professionals (UK Edition);Apr2005, p70 

    Reviews version 4.2 of the mobile data security software SafeBoot from Control Break.

  • Trusted mobile model based on DTE technology. Li, Tao; Hu, Aiqun // International Journal of Information Security;Oct2015, Vol. 14 Issue 5, p457 

    Due to increasing demands for mobile security, the Trusted Computing Group organized a special group-Mobile Phone Working Group (MPWG) to deal with mobile security specification business. Though MPWG proposes an architecture of trusted mobile platform (TMP), it does not indicate specific...

  • Open Specs Due for Mobile Security. Roberts, Paul F. // InfoWorld;9/4/2006, Vol. 28 Issue 36, p12 

    The article reports the plan of the Cellular Telecommunications and Internet Association (CTIA) to create open specifications to embed trust into mobile devices to improve data protection. The plan was conceived after Trust Digital reported that used smartphones and personal digital assistants...

  • Related Work in Access-Control Policies.  // IEEE Internet Computing;Mar/Apr2008, Vol. 12 Issue 2, p40 

    The article discusses the suitability of Role-Based Access Control (RBAC) standard to act as the baseline for location-based access control in mobile computing applications. RBAC is considered suitable for access control in computing applications because it meets the requirement of allowing...

  • Group Test: Mobile data. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Apr2005, p66 

    This article offers a look at the significance of mobile data encryption. Mobile computing carries the implicit risk that devices will simply be stolen, and users accessing other desktop systems can easily cause data to be compromised. Preventing access to devices is a topic in itself, but...

  • Simplified Trusted Computing. Rodcay, Gayle // Windows IT Pro;Jan2006, Vol. 12 Issue 1, p31 

    The article deals with the standards-based security solutions of Trusted Computing Group (TCG) that were developed in response to the demand of business and consumers for a more trustworthy, private and secure. The standards of TCG are based on a security chip called Trusted Platform Module...

  • Disk-drive encryption gains ground. Messmer, Ellen // Network World;2/2/2009, Vol. 26 Issue 5, p10 

    The author offers comments on the advantage of the Opal Security Subsystem Class Specification 1.0 from Trusted Computing Group. The author mentions that subsystem offers a set of mechanisms and protocols for disk-drive encryption, authentication, configuration and policy management. He believes...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics