Skip to Main Content
The sensitive information leakage accidents due to insiders were always troublesome. Based on trusted computing technologies the paper designs a model called secure information flows control model ( SIFCM for short) that will be applied in sensitive organizations. SIFCM protects sensitive information by encrypting any sensitive information flowing out of the system and guaranteeing the confidentiality of sensitive information against decryption outside the system boundary. The model is based on the hardware protection capability of trusted computing to prevent the keys from being obtained by unauthorized persons.