Launch Time Application Security: The Trusted Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

In the day to day lives of human beings commodity computers are increasingly used to access banking transactions, sending sensitive e-mails, accessing personal and confidential information from remote systems, where it becomes the prime necessity to assure the user that security sensitive operations executes always on secure and trusted state of system. The emergence of the Trusted Platform Module (TPM) has added to the security feature of a computer. Much work has been done to ensure the integrity of the system using a TPM. But what happens when the applications running on top of the Trusted System are malicious? The sensitive data provided to such applications becomes vulnerable for exploit. We propose a system which notifies the user if the integrity of an application is violated and stops it. The system makes use of the functionalities of the TPM chip.

Keywords: Trust, Trusted Platform Module, TPM, Integrity Measurement, Sealing, Application Security

Edition: Volume 2 Issue 3, March 2013

Pages: 168 - 172

Share this Article

How to Cite this Article?

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E., "Launch Time Application Security: The Trusted Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013114, Volume 2 Issue 3, March 2013, 168 - 172

75 PDF Views | 68 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Trust'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 431 - 433

Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring

Arjumand Arshi, Dr. Sameena Banu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Expert's Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'Trusted Platform Module'

Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015

Pages: 1446 - 1450

Mutual Authentication Cloud Computing Platform based on TPM

Lei Peng, Yanli Xiao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this Article

Similar Articles with Keyword 'TPM'

Research Paper, Computer Science & Engineering, China, Volume 4 Issue 11, November 2015

Pages: 1446 - 1450

Mutual Authentication Cloud Computing Platform based on TPM

Lei Peng, Yanli Xiao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this Article

Similar Articles with Keyword 'Application Security'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1416 - 1420

Mitigation of CSRF Attack

Nikunj Tandel, Kalpesh Patel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 372 - 374

A Review on Database Security

Tejashri R. Gaikwad, A. B. Raut

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 769 - 773

A Secure Multilayer Honeypot in an E-Commerce Web Application

Gaurav Beriwal, Anuj Garg, Ravinder Jangra

Share this Article
Top