Security extensions for integrity and confidentiality in embedded processors.
Austin RogersAleksandar MilenkovicPublished in: Microprocess. Microsystems (2009)
Keyphrases
- data confidentiality
- embedded processors
- access control
- information security
- data quality
- data security
- data integrity
- security properties
- sensitive data
- high assurance
- single chip
- trusted computing
- security requirements
- information flow control
- parallel implementation
- information leakage
- integrity verification
- security policies
- data protection
- efficient implementation
- intrusion detection
- statistical databases
- digital images