首页> 外文会议>IFIP WG 11.2 Interntional Workshop on Information Security Theory and Practices >Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information
【24h】

Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information

机译:软件无法保护软件:用于安全性的专用硬件的参数,以及信息可信度的分类

获取原文

摘要

There are many current classifications and taxonomies relating to computer security. One missing classification is the Trustworthiness of Information being received by the security system, which we define. This new classification along with Timeliness of Detection and Security level of the Security System present motivation for hardware-based security solutions. Including hardware is not an automatic solution to the limitations of software solutions. Advantages are only gained from hardware through design that ensures at least First-hand Information, dedicated monitors, explicit hardware communication, dedicated storage, and dedicated security processors.
机译:有许多与计算机安全有关的分类和分类。一个缺少的分类是我们定义的安全系统正在接收的信息的可信度。这种新分类以及安全系统的检测和安全级别的及时性,目前基于硬件的安全解决方案的动机。包括硬件不是自动解决软件解决方案限制的解决方案。优点仅通过硬件从硬件中获取,可确保至少第一手信息,专用监视器,显式硬件通信,专用存储和专用安全处理器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号