White paper: Towards a Second Line of Defense for Computer Security

dc.contributor.authorVishkin, Uzi
dc.date.accessioned2014-06-13T01:54:07Z
dc.date.available2014-06-13T01:54:07Z
dc.date.issued2013-04-30
dc.description.abstractMuch academic research on computer security has followed a perfectionist approach, seeking a system so secure that it cannot be penetrated. However, in reality security is breached and systems are penetrated. This working paper outlines some preliminary concepts for thinking about such less fortunate circumstances. It also reviews a hardware mechanism called security master for addressing them.en_US
dc.identifier.urihttp://hdl.handle.net/1903/15083
dc.language.isoen_USen_US
dc.relation.isAvailableAtCollege of Computer, Mathematical & Natural Sciencesen_us
dc.relation.isAvailableAtComputer Scienceen_us
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_us
dc.relation.isAvailableAtUniversity of Maryland (College Park, MD)en_us
dc.subjectComputer securityen_US
dc.subjectSecond line of defenseen_US
dc.subjectHardware mechanismsen_US
dc.titleWhite paper: Towards a Second Line of Defense for Computer Securityen_US
dc.typeWorking Paperen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
TR second line of defense for security.docx
Size:
88.87 KB
Format:
Microsoft Word 2007