Launch Time Application Security: The Trusted Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

In the day to day lives of human beings commodity computers are increasingly used to access banking transactions, sending sensitive e-mails, accessing personal and confidential information from remote systems, where it becomes the prime necessity to assure the user that security sensitive operations executes always on secure and trusted state of system. The emergence of the Trusted Platform Module (TPM) has added to the security feature of a computer. Much work has been done to ensure the integrity of the system using a TPM. But what happens when the applications running on top of the Trusted System are malicious? The sensitive data provided to such applications becomes vulnerable for exploit. We propose a system which notifies the user if the integrity of an application is violated and stops it. The system makes use of the functionalities of the TPM chip.

Keywords: Trust, Trusted Platform Module, TPM, Integrity Measurement, Sealing, Application Security

Edition: Volume 2 Issue 3, March 2013

Pages: 168 - 172

Share this Article

How to Cite this Article?

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E., "Launch Time Application Security: The Trusted Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013114, Volume 2 Issue 3, March 2013, 168 - 172

114 PDF Views | 103 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Trust'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 137 - 140

Intelligent Health and Education Trust Recommendation System

Bhavin Rathod; Deepraj Sawant; Tejas Shetye; Silviya D'Monte

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 431 - 433

Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring

Arjumand Arshi, Dr. Sameena Banu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'Trusted Platform Module'

Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015

Pages: 1446 - 1450

Mutual Authentication Cloud Computing Platform based on TPM

Lei Peng, Yanli Xiao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this Article

Similar Articles with Keyword 'TPM'

Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015

Pages: 1446 - 1450

Mutual Authentication Cloud Computing Platform based on TPM

Lei Peng, Yanli Xiao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this Article

Similar Articles with Keyword 'Application Security'

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1416 - 1420

Mitigation of CSRF Attack

Nikunj Tandel, Kalpesh Patel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this Article
Top