List of criteria for a secure computer architecture

被引:1
|
作者
Podebrad, Igor [1 ]
Hildebrandt, Klaus [2 ]
Klauer, Bernd [2 ]
机构
[1] Commerzbank AG, Frankfurt, Germany
[2] Helmut Schmidt Univ, Hamburg, Germany
关键词
computer-architecture; parts of von-Neumann-Maschine; IT-security;
D O I
10.1109/SECURWARE.2009.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of a digital system depends directly on the security of the hardware platform the system is based on. The analysis of currently available computer architectures has shown that such systems offer a lot of security gaps. This is due to the fact that in the past hardware has only been optimized for speed - never for security. In this paper we propose a set of hardware features to support system security.
引用
收藏
页码:76 / +
页数:3
相关论文
共 50 条
  • [1] A SECURE COMPUTER ARCHITECTURE MODEL AND ITS EMULATION
    Gorelov, V. V.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2010, 10 (04): : 23 - +
  • [2] Security measures in a secure computer communications architecture
    Bottino, Louis J.
    [J]. 2006 IEEE/AIAA 25TH DIGITAL AVIONICS SYSTEMS CONFERENCE, VOLS 1- 3, 2006, : 1078 - 1095
  • [3] Secure list decoding
    Hayashi, Masahito
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2149 - 2153
  • [4] Secure Codes With List Decoding
    Gu, Yujie
    Vorobyev, Ilya
    Miao, Ying
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (04) : 2430 - 2442
  • [5] A New Secure Architecture of Network Computer Based on Single CPU and Dual Bus
    Shao, Fengjing
    Sun, Rencheng
    Diao, Kegang
    Wang, Xiaopeng
    [J]. SEC 2008: PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING, 2008, : 309 - 314
  • [6] A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS
    Kardas, Geylani
    Celikel, Ebru
    Alaybeyoglu, Aysegul
    [J]. PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2008, 14 (01): : 31 - 40
  • [7] Revised red list criteria
    不详
    [J]. ORYX, 2001, 35 (04) : 358 - 358
  • [8] BEHAVIOR CHECK LIST CRITERIA
    RICHLIN, M
    SIEGEL, A
    [J]. AMERICAN PSYCHOLOGIST, 1958, 13 (07) : 377 - 377
  • [9] CRITERIA FOR ADMISSION TO THE OBSTETRIC LIST
    NICKLESS, SJ
    [J]. BRITISH MEDICAL JOURNAL, 1984, 289 (6454): : 1310 - 1310
  • [10] The architecture of secure systems
    Alves-Foss, J
    [J]. PROCEEDINGS OF THE THIRTY-FIRST HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL III: EMERGING TECHNOLOGIES TRACK, 1998, : 307 - 316