Embedded processor security
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2007
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/1/Print-SAM2007.pdf |
id |
iium-709 |
---|---|
recordtype |
eprints |
spelling |
iium-7092011-08-02T04:04:11Z http://irep.iium.edu.my/709/ Embedded processor security d'Auriol, Brian J. Pathan, Al-Sakib Khan Q Science (General) QA76 Computer software A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the data modeling, process modeling and network modeling of the associated security-tagged data. This work is a part of a larger issue that instruction set architectures (ISAs) do not consider the information assurance implications in its operational environment. 2007 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/709/1/Print-SAM2007.pdf d'Auriol, Brian J. and Pathan, Al-Sakib Khan (2007) Embedded processor security. In: 2007 International Conference on Security and Management (SAM'07), June 25-28, 2007, Las Vegas, Nevada, USA. http://www.world-academy-of-science.org/worldcomp07/ws/SAM07 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
Q Science (General) QA76 Computer software |
spellingShingle |
Q Science (General) QA76 Computer software d'Auriol, Brian J. Pathan, Al-Sakib Khan Embedded processor security |
description |
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the data modeling, process modeling and network modeling of the associated security-tagged data. This work is a part of a larger issue that instruction set architectures (ISAs) do not consider the information assurance implications in its operational environment. |
format |
Conference or Workshop Item |
author |
d'Auriol, Brian J. Pathan, Al-Sakib Khan |
author_facet |
d'Auriol, Brian J. Pathan, Al-Sakib Khan |
author_sort |
d'Auriol, Brian J. |
title |
Embedded processor security |
title_short |
Embedded processor security |
title_full |
Embedded processor security |
title_fullStr |
Embedded processor security |
title_full_unstemmed |
Embedded processor security |
title_sort |
embedded processor security |
publishDate |
2007 |
url |
http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/1/Print-SAM2007.pdf |
first_indexed |
2023-09-18T20:07:52Z |
last_indexed |
2023-09-18T20:07:52Z |
_version_ |
1777407279589490688 |