Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Department of Computer Science, Columbia University
Information and Communications Security, Lecture Notes in Computer Science, 2005, Volume 3783/2005, 363-375
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker, or even by the owner of a system to spy on other users of the system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet.
December 13, 2010 by hgpu