White paper: Towards a Second Line of Defense for Computer Security
White paper: Towards a Second Line of Defense for Computer Security
No Thumbnail Available
Files
Publication or External Link
Date
2013-04-30
Authors
Advisor
Citation
DRUM DOI
Abstract
Much academic research on computer security has followed a perfectionist approach, seeking a system so secure that it cannot be penetrated. However, in reality security is breached and systems are penetrated. This working paper outlines some preliminary concepts for thinking about such less fortunate circumstances. It also reviews a hardware mechanism called security master for addressing them.