CHORS: hardening high-assurance security systems with trusted computing.
Wojciech OzgaRasha FaqehDo Le QuocFranz GregorSilvio DragoneChristof FetzerPublished in: SAC (2022)
Keyphrases
- security systems
- trusted computing
- high assurance
- access control
- security mechanisms
- access control policies
- operating system
- fault tolerant
- software systems
- rule based systems
- distributed systems
- computing platform
- computing environments
- computer security
- virtual organization
- trusted platform module
- cloud computing
- computer systems
- distributed computing
- security policies
- multimodal biometrics
- security requirements
- data streams
- embedded systems
- sensor networks