Enhanced embedded device security by combining hardware-based trust mechanisms.
Martin SchrammKarl LeidlAndreas GrzembaNicolai KuntzePublished in: CCS (2013)
Keyphrases
- security services
- trusted computing
- embedded systems
- security mechanisms
- low cost
- electronic transactions
- security issues
- control software
- data acquisition
- information security
- key management
- public key infrastructure
- trust relationships
- computer security
- access control
- security requirements
- real time
- computing platform
- hardware implementation
- security protocols
- trust negotiation
- defense mechanisms
- embedded processors
- trust model
- personal information
- trust management
- hardware and software
- smart card
- electronic commerce
- intrusion detection
- random number generator
- micro controller
- security policies
- rfid tags
- desktop computers
- identity management
- statistical databases
- reputation mechanisms
- privacy concerns
- policy enforcement