首页> 外文会议>Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks >Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness ofInformation
【24h】

Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness ofInformation

机译:软件不能保护软件:关于安全性中专用硬件的争论和信息可信度的分类

获取原文
获取原文并翻译 | 示例

摘要

There are many current classifications and taxonomies relating to computer security. One missing classification is the Trustworthiness of Information being received by the security system, which we define. This new classification along with Timeliness of Detection and Security level of the Security System present motivation for hardware-based security solutions. Including hardware is not an automatic solution to the limitations of software solutions. Advantages are only gained from hardware through design that ensures at least First-hand Information, dedicated monitors, explicit hardware communication, dedicated storage, and dedicated security processors.
机译:当前有许多与计算机安全有关的分类和分类法。我们定义的一种缺失的分类是安全系统正在接收的信息的可信赖性。这种新的分类以及安全系统的及时性检测和安全级别为基于硬件的安全解决方案提供了动力。包括硬件并不是解决软件解决方案局限性的自动解决方案。只有通过确保至少第一手信息,专用监视器,显式硬件通信,专用存储和专用安全处理器的设计,硬件才能获得优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号