[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Saydjari, 2002 - Google Patents

Lock: An historical perspective

Saydjari, 2002

View PDF
Document ID
16333518469572227936
Author
Saydjari O
Publication year
Publication venue
18th Annual Computer Security Applications Conference, 2002. Proceedings.

External Links

Snippet

LOCK is an advanced development of hardware-based computer security and crypto- graphic service modules. Much of the design and some of the implementation specifications are complete. The Formal Top Level Specification (FTLS) also is complete and the …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Similar Documents

Publication Publication Date Title
Myers et al. Protecting privacy using the decentralized label model
Saydjari et al. LOCK Trak: Navigating uncharted space
Ahmed et al. Static verification of security requirements in role based CSCW systems
Myers Mostly-static decentralized information flow control
US7631342B2 (en) Data security verification for data transfers between security levels in trusted operating system
Mayer et al. SELinux by example: using security enhanced Linux
US8024564B2 (en) Automating configuration of software applications
Betarte et al. Verifying android’s permission model
Hsaini et al. FSM modeling of testing security policies for mapreduce frameworks
Saydjari Lock: An historical perspective
Ge et al. Secure databases: an analysis of Clark-Wilson model in a database environment
Ding et al. SC-RBAC: a smart contract based RBAC model for DApps
Veschetti et al. SmartML: Towards a Modeling Language for Smart Contracts
Gadouche et al. A correct-by-construction model for attribute-based access control: Illustration: web-based healthcare services
Herrmann Information flow analysis of component-structured applications
Barletta et al. Workflow and access control reloaded: a declarative specification framework for the automated analysis of Web services
Pölck Small TCBs of policy-controlled operating systems
Magazinius et al. Decentralized delimited release
Beckman et al. LOCK trak: Navigating Uncharted Space
Shapiro et al. Verifying operating system security
Stasiak et al. Multi-level Security System Verification Based on the Model
Bruckner et al. A Framework for Creating Policy-agnostic Programming Languages.
Pasin et al. Design and early release of Security, Safety and Robustness mechanisms and tools
Thomsen Practical policy patterns
Smarkusky et al. Role based security and Java