White paper: Towards a Second Line of Defense for Computer Security
dc.contributor.author | Vishkin, Uzi | |
dc.date.accessioned | 2014-06-13T01:54:07Z | |
dc.date.available | 2014-06-13T01:54:07Z | |
dc.date.issued | 2013-04-30 | |
dc.description.abstract | Much academic research on computer security has followed a perfectionist approach, seeking a system so secure that it cannot be penetrated. However, in reality security is breached and systems are penetrated. This working paper outlines some preliminary concepts for thinking about such less fortunate circumstances. It also reviews a hardware mechanism called security master for addressing them. | en_US |
dc.identifier.uri | http://hdl.handle.net/1903/15083 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | College of Computer, Mathematical & Natural Sciences | en_us |
dc.relation.isAvailableAt | Computer Science | en_us |
dc.relation.isAvailableAt | Digital Repository at the University of Maryland | en_us |
dc.relation.isAvailableAt | University of Maryland (College Park, MD) | en_us |
dc.subject | Computer security | en_US |
dc.subject | Second line of defense | en_US |
dc.subject | Hardware mechanisms | en_US |
dc.title | White paper: Towards a Second Line of Defense for Computer Security | en_US |
dc.type | Working Paper | en_US |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- TR second line of defense for security.docx
- Size:
- 88.87 KB
- Format:
- Microsoft Word 2007