Login / Signup
Verifying a Hardware Security Architecture.
Joshua D. Guttman
H.-P. Ko
Published in:
IEEE Symposium on Security and Privacy (1990)
Keyphrases
</>
security architecture
access control
security policies
low cost
security model
simulation platform
data integrity
security mechanisms
insider threat
embedded systems
intrusion detection system
electronic commerce
computer systems
distributed databases
database applications
data protection
data processing