Extending Tamper-Proof Hardware Security to Untrusted Execution Environments.
Sergio LoureiroLaurent BussardYves RoudierPublished in: CARDIS (2002)
Keyphrases
- security policies
- security level
- low cost
- security properties
- sensitive data
- access control
- real time
- information security
- hardware and software
- privacy preserving
- security requirements
- trusted computing
- data privacy
- parallel execution
- network security
- random number generator
- dynamic environments
- highly dynamic environments
- statistical databases
- third party
- security issues
- computer systems
- key management
- protection scheme
- memory management
- rfid tags
- security mechanisms
- human operators
- computing systems
- theorem proving
- theorem prover
- embedded systems
- information systems
- field programmable gate array
- security analysis
- plan execution
- biometric systems
- hardware implementation
- computing environments