Embedded processor security
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the...
| Main Authors: | , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/1/Print-SAM2007.pdf |
| _version_ | 1848775745351974912 |
|---|---|
| author | d'Auriol, Brian J. Pathan, Al-Sakib Khan |
| author_facet | d'Auriol, Brian J. Pathan, Al-Sakib Khan |
| author_sort | d'Auriol, Brian J. |
| building | IIUM Repository |
| collection | Online Access |
| description | A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the data modeling, process modeling and network modeling of the associated security-tagged data. This work is a part of a larger issue that instruction set architectures (ISAs) do not consider the information assurance implications in its operational environment. |
| first_indexed | 2025-11-14T14:19:05Z |
| format | Proceeding Paper |
| id | iium-709 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:19:05Z |
| publishDate | 2007 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-7092011-08-02T04:04:11Z http://irep.iium.edu.my/709/ Embedded processor security d'Auriol, Brian J. Pathan, Al-Sakib Khan Q Science (General) QA76 Computer software A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the data modeling, process modeling and network modeling of the associated security-tagged data. This work is a part of a larger issue that instruction set architectures (ISAs) do not consider the information assurance implications in its operational environment. 2007 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/709/1/Print-SAM2007.pdf d'Auriol, Brian J. and Pathan, Al-Sakib Khan (2007) Embedded processor security. In: 2007 International Conference on Security and Management (SAM'07), June 25-28, 2007, Las Vegas, Nevada, USA. http://www.world-academy-of-science.org/worldcomp07/ws/SAM07 |
| spellingShingle | Q Science (General) QA76 Computer software d'Auriol, Brian J. Pathan, Al-Sakib Khan Embedded processor security |
| title | Embedded processor security |
| title_full | Embedded processor security |
| title_fullStr | Embedded processor security |
| title_full_unstemmed | Embedded processor security |
| title_short | Embedded processor security |
| title_sort | embedded processor security |
| topic | Q Science (General) QA76 Computer software |
| url | http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/1/Print-SAM2007.pdf |