To obtain access to full text of journal and articles you must register!
- Article name
- Differences in approaches to step-by-step integrity control: TPM and IMA/EVM or HSC DST PUA
- Authors
- Kanner A. M., , kanner@okbsapr.ru, JSC "OKB SAPR", Moscow, Russia
- Keywords
- step-by-step integrity control / trusted startup hardware module / trusted platform module
- Year
- 2018 Issue 2 Pages 9 - 13
- Code EDN
- Code DOI
- Abstract
- The article considers the existing approaches to step-by-step integrity control in Russian domestic and foreign information security tools and analyzes their differences. The comparison of functional and technical characteristics of software and hardware complexes of data security tools against unauthorized access and solutions that use the trusted platform module as a basis for further measuring the integrity and creation of the root of trust is made, conclusions are made about the appropriateness of using certain data security tools.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy