Automation for Creating and Configuring Security Manifests for Hardware Containers.
Eugen LeontieGedare BloomRahul SimhaPublished in: SafeConfig (2011)
Keyphrases
- industrial automation
- access control
- real time
- hardware and software
- random number generator
- low cost
- trusted computing
- security issues
- information security
- image processing
- security threats
- security systems
- embedded systems
- computer systems
- massively parallel
- statistical databases
- computer security
- protection scheme
- circuit design
- hardware design
- application level
- security policies
- security problems
- network access
- windows xp
- security measures
- cyber security
- security analysis
- computing systems
- network security