SoC Trust Validation Using Assertion-Based Security Monitors.
Khitam AlatounBharath ShankaranarayananShanmukha Murali AchyuthaRanga VemuriPublished in: ISQED (2021)
Keyphrases
- trust management
- information security
- security services
- trust model
- trust relationships
- access control
- trusted computing
- security policies
- security issues
- privacy concerns
- security requirements
- intrusion detection
- public key infrastructure
- trust evaluation
- trust negotiation
- statistical databases
- computer security
- network security
- cyber security
- virtual communities
- security model
- security management
- policy enforcement
- virtual teams
- security systems
- data security
- security protocols
- personal information
- security level
- security analysis
- key management
- internet banking
- virtual organization
- information flow
- access control models
- electronic transactions
- low cost