Runtime creation of continuous secure zones in many-core systems for secure applications.
Luciano L. CaimiVinicius FochiEduardo WächterFernando Gehm MoraesPublished in: LASCAS (2018)
Keyphrases
- method invocation
- payment systems
- security patterns
- security measures
- covert channel
- security requirements
- computer systems
- database
- computing systems
- security issues
- standard model
- management system
- expert systems
- complex systems
- learning systems
- security analysis
- user authentication
- authentication scheme
- diffie hellman
- digital libraries
- information systems
- artificial intelligence
- data encryption
- data sets
- real time