The secure enterprise desktop: Changing today's computing infrastructure

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

An end-user computing environment is characterized by an image which is the ensemble comprising operating system, applications and data) and by the hardware where the image is running. One can essentially distinguish two fundamental approaches: either the image is installed on a given end-user owned computer or the image is run on a server and is remotely accessed by the user through a remote desktop. Both approaches, however, have a disadvantage. In the former case, no network connectivity is required as the image is stored on the local computer, this data is lost when the computer such as a notebook is lost or stolen. Moreover, in an enterprise environment, it is very difficult to control that image and apply patches, check for viruses etc. While the latter approach waives these shortcommings, a continuous network connection is required to work with that virtual machine which may not be always available. With the Secure Enterprise Desktop, we bridge this gap and allow users to use their computer image locally or remotely and ensure that their computer image is continuously synchronized. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Gschwind, T., Baentsch, M., Schade, A., & Scotton, P. (2012). The secure enterprise desktop: Changing today’s computing infrastructure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7592 LNCS, pp. 275–276). https://doi.org/10.1007/978-3-642-33427-6_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free