Saydjari, 2002 - Google Patents
Lock: An historical perspectiveSaydjari, 2002
View PDF- Document ID
- 16333518469572227936
- Author
- Saydjari O
- Publication year
- Publication venue
- 18th Annual Computer Security Applications Conference, 2002. Proceedings.
External Links
Snippet
LOCK is an advanced development of hardware-based computer security and crypto- graphic service modules. Much of the design and some of the implementation specifications are complete. The Formal Top Level Specification (FTLS) also is complete and the …
- 238000011156 evaluation 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Myers et al. | Protecting privacy using the decentralized label model | |
Saydjari et al. | LOCK Trak: Navigating uncharted space | |
Ahmed et al. | Static verification of security requirements in role based CSCW systems | |
Myers | Mostly-static decentralized information flow control | |
US7631342B2 (en) | Data security verification for data transfers between security levels in trusted operating system | |
Mayer et al. | SELinux by example: using security enhanced Linux | |
US8024564B2 (en) | Automating configuration of software applications | |
Betarte et al. | Verifying android’s permission model | |
Hsaini et al. | FSM modeling of testing security policies for mapreduce frameworks | |
Saydjari | Lock: An historical perspective | |
Ge et al. | Secure databases: an analysis of Clark-Wilson model in a database environment | |
Ding et al. | SC-RBAC: a smart contract based RBAC model for DApps | |
Veschetti et al. | SmartML: Towards a Modeling Language for Smart Contracts | |
Gadouche et al. | A correct-by-construction model for attribute-based access control: Illustration: web-based healthcare services | |
Herrmann | Information flow analysis of component-structured applications | |
Barletta et al. | Workflow and access control reloaded: a declarative specification framework for the automated analysis of Web services | |
Pölck | Small TCBs of policy-controlled operating systems | |
Magazinius et al. | Decentralized delimited release | |
Beckman et al. | LOCK trak: Navigating Uncharted Space | |
Shapiro et al. | Verifying operating system security | |
Stasiak et al. | Multi-level Security System Verification Based on the Model | |
Bruckner et al. | A Framework for Creating Policy-agnostic Programming Languages. | |
Pasin et al. | Design and early release of Security, Safety and Robustness mechanisms and tools | |
Thomsen | Practical policy patterns | |
Smarkusky et al. | Role based security and Java |