HARDWARE AND NETWORK CONFIGURATION - ASSURANCE OF RELIABILITY AND SECURITY

被引:0
|
作者
HAGA, M
机构
来源
NTT REVIEW | 1994年 / 6卷 / 06期
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
CUSTOM is a giant system, and one of the few online systems in the world to link multivendor computers. Between 25,000 and 30,000 terminals are connected to this network. Since it is a system that deals directly with customers, any trouble with its computers or communications facilities could be greatly inconvenient to those customers. This article outlines the configuration of the hardware and network that could be called CUSTOM's nervous system.
引用
收藏
页码:73 / 76
页数:4
相关论文
共 50 条
  • [1] Failure analysis for hardware assurance and security
    Rahman, M. Tanjidur
    Asadizanjani, Navid
    Electronic Device Failure Analysis, 2019, 21 (03): : 16 - 24
  • [2] Hardware Security Through Chain Assurance
    Obeng, Yaw
    Nolan, Colm
    Brown, David
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1535 - 1537
  • [3] Reliability and Security of AI Hardware
    Gotthard, Dennis Gnad Martin
    Gotthard, Martin
    Krautter, Jonas
    Kritikakou, Angeliki
    Meyers, Vincent
    Rech, Paolo
    Condia, Josie E. Rodriguez
    Ruospo, Annachiara
    Sanchez, Ernesto
    dos Santos, Fernando Fernandes
    Sentieys, Olivier
    Tahoori, Mehdi
    Tessier, Russell
    Traiola, Marcello
    IEEE EUROPEAN TEST SYMPOSIUM, ETS 2024, 2024,
  • [4] Hardware Security for Internet of Things Identity Assurance
    Cirne, Andre
    Sousa, Patricia R.
    Resende, Joao S.
    Antunes, Luis
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 1041 - 1079
  • [5] Hardware Security Assurance in Emerging IoT Applications
    Dofe, Jaya
    Frey, Jonathan
    Yu, Qiaoyan
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 2050 - 2053
  • [6] Identity assurance and network security
    Serrato, C., 1600, Elsevier Ltd (2012):
  • [7] Hardware Assurance: Trojans, Counterfeits, and Security in an Interconnected World
    Casto, Matthew
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 5 - 5
  • [8] Hardware Security Evaluation Using Assurance Case Models
    Kawakami, Henrique
    Gallo, Roberto
    Dahab, Ricardo
    Nascimento, Erick
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 193 - 198
  • [9] HARDWARE RELIABILITY ASSURANCE AND FIELD EXPERIENCE IN A TELECOM ENVIRONMENT
    HALLBERG, O
    ERIKSSON, B
    FRANCIS, R
    HJORTENDAL, R
    LINDBERG, LI
    SAVSTROM, B
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 1994, 10 (03) : 195 - 200
  • [10] Assessing of software security reliability: Dimensional security assurance techniques
    Ali, Mohammad
    Ullah, Ahsan
    Islam, Md. Rashedul
    Hossain, Rifat
    COMPUTERS & SECURITY, 2025, 150