International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 125 | Views: 130

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013


Launch Time Application Security: The Trusted Approach

Renu Mary Daniel | Angela Francis | Vinodh Ewards S. E.


Abstract: In the day to day lives of human beings commodity computers are increasingly used to access banking transactions, sending sensitive e-mails, accessing personal and confidential information from remote systems, where it becomes the prime necessity to assure the user that security sensitive operations executes always on secure and trusted state of system. The emergence of the Trusted Platform Module (TPM) has added to the security feature of a computer. Much work has been done to ensure the integrity of the system using a TPM. But what happens when the applications running on top of the Trusted System are malicious? The sensitive data provided to such applications becomes vulnerable for exploit. We propose a system which notifies the user if the integrity of an application is violated and stops it. The system makes use of the functionalities of the TPM chip.


Keywords: Trust, Trusted Platform Module, TPM, Integrity Measurement, Sealing, Application Security


Edition: Volume 2 Issue 3, March 2013,


Pages: 168 - 172


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E., "Launch Time Application Security: The Trusted Approach", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 168-172, https://www.ijsr.net/get_abstract.php?paper_id=IJSROFF2013114



Similar Articles with Keyword 'Trust'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 672 - 675

Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio

Shashank Dhananjaya | Yuvaraju B N

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article



Top