Enhancing security via provably trustworthy hardware intellectual property.
Eric LoveYier JinYiorgos MakrisPublished in: HOST (2011)
Keyphrases
- intellectual property
- random number generator
- patent search
- hardware and software
- clef ip
- information security
- trust management
- access control
- network security
- patent information
- real time
- statistical databases
- low cost
- patent documents
- hardware implementation
- intrusion detection
- trusted computing
- security issues
- security analysis
- security requirements
- security policies
- prior art
- computer systems
- security mechanisms
- security protocols
- hardware architecture
- embedded systems
- operating system
- worst case
- protection scheme
- information technology
- information systems