Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Vasily DesnitskyAndrey ChechulinIgor V. KotenkoDmitry LevshunMaxim KolomeecPublished in: PDP (2016)
Keyphrases
- security level
- protection scheme
- previously mentioned
- security requirements
- information security
- security issues
- embedded systems
- data security
- key management
- intrusion detection
- security properties
- design process
- security analysis
- application level
- functional requirements
- cryptographic protocols
- identity management
- security management
- trusted computing
- operating system