Managing Access to Security Hardware in PC Browsers.
Darmawan SuwiryaKaren LuLaurent CastilloPublished in: WASH (2013)
Keyphrases
- access control
- personal computer
- network access
- hard disk
- windows xp
- host computer
- information security
- security requirements
- hardware and software
- random number generator
- low cost
- access requests
- network security
- sys tems
- wireless networks
- service management
- real time
- security mechanisms
- security issues
- security policies
- statistical databases
- central processor
- protection schemes
- intrusion detection
- hardware implementation
- trusted computing
- mission critical
- role based access control
- cyber security
- computer security
- situational awareness
- embedded systems
- operating system
- protection scheme
- data security
- website
- metadata
- web pages