2011 | OriginalPaper | Chapter
Secure Workstation for Special Applications
Authors : Adam Kozakiewicz, Anna Felkner, Janusz Furtak, Zbigniew Zieliński, Marek Brudka, Marek Małowidzki
Published in: Secure and Trust Computing, Data Management, and Applications
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
The paper presents the recently started project which aims to develop a secure environment for processing of restricted information. The solution being developed by the consortium employs virtualization to allow data from different security domains to be processed on the same physical machine. The system can host Windows and Linux systems as secured guest operating systems. The proposed implementation offers advanced user authentication techniques and cryptographic protection. The project is expected to reach technology demonstrator phase in late 2012.