Embedded processor security

A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the...

Full description

Bibliographic Details
Main Authors: d'Auriol, Brian J., Pathan, Al-Sakib Khan
Format: Conference or Workshop Item
Language:English
Published: 2007
Subjects:
Online Access:http://irep.iium.edu.my/709/
http://irep.iium.edu.my/709/
http://irep.iium.edu.my/709/1/Print-SAM2007.pdf
id iium-709
recordtype eprints
spelling iium-7092011-08-02T04:04:11Z http://irep.iium.edu.my/709/ Embedded processor security d'Auriol, Brian J. Pathan, Al-Sakib Khan Q Science (General) QA76 Computer software A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the data modeling, process modeling and network modeling of the associated security-tagged data. This work is a part of a larger issue that instruction set architectures (ISAs) do not consider the information assurance implications in its operational environment. 2007 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/709/1/Print-SAM2007.pdf d'Auriol, Brian J. and Pathan, Al-Sakib Khan (2007) Embedded processor security. In: 2007 International Conference on Security and Management (SAM'07), June 25-28, 2007, Las Vegas, Nevada, USA. http://www.world-academy-of-science.org/worldcomp07/ws/SAM07
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic Q Science (General)
QA76 Computer software
spellingShingle Q Science (General)
QA76 Computer software
d'Auriol, Brian J.
Pathan, Al-Sakib Khan
Embedded processor security
description A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the data modeling, process modeling and network modeling of the associated security-tagged data. This work is a part of a larger issue that instruction set architectures (ISAs) do not consider the information assurance implications in its operational environment.
format Conference or Workshop Item
author d'Auriol, Brian J.
Pathan, Al-Sakib Khan
author_facet d'Auriol, Brian J.
Pathan, Al-Sakib Khan
author_sort d'Auriol, Brian J.
title Embedded processor security
title_short Embedded processor security
title_full Embedded processor security
title_fullStr Embedded processor security
title_full_unstemmed Embedded processor security
title_sort embedded processor security
publishDate 2007
url http://irep.iium.edu.my/709/
http://irep.iium.edu.my/709/
http://irep.iium.edu.my/709/1/Print-SAM2007.pdf
first_indexed 2023-09-18T20:07:52Z
last_indexed 2023-09-18T20:07:52Z
_version_ 1777407279589490688