1. Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin 2. Time-Bound Keys Announcements • New tool: TimedKey.exe • New whitepaper:…
1. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology Ravi Sandhu and Xinwen ZhangGeorge Mason University SACMAT05, June 1--3, 2005, Stockholm, Sweden…