Inheriting Software Security Policies within Hardware IP Components.
Festus HategekimanaJoel Mandebi MbongueMd Jubaer Hossain PanthoChristophe BobdaPublished in: FCCM (2018)
Keyphrases
- security policies
- access control
- commercial off the shelf
- software components
- hardware design
- computer systems
- security management
- hardware software
- low cost
- network security
- embedded systems
- software development
- hardware and software
- hardware platforms
- access control systems
- software architecture
- security requirements
- distributed systems
- network management
- cyber attacks
- blue gene
- security concerns
- software systems
- software design
- access control policies
- source code
- unauthorized access
- computing systems
- multilevel secure
- database
- hardware implementation
- data mining