Hardware Security Module (HSM)

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design, Implementation, and Evaluation of a Vehicular Hardware Security Module

Todays in-vehicle IT architectures are dominated by a large network of interactive, software driven digital microprocessors called electronic control units (ECU). However, ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for manipulations or misuse. Thus, especially safety...

متن کامل

Security Module: Security Design Patterns

Description Software design patterns are solutions to problems that arise regularly during software design. They are meant to serve as readily applicable, time-saving strategies for software development. The structured documentation that accompanies a properly defined pattern allows developers to quickly identify and apply patterns to a given problem. Security patterns are software design patte...

متن کامل

AVR2027: AES Security Module

Auxialiary Security Header Encrypted NWK payload MIC security information and integrity code (MIC)

متن کامل

Linux Security Module Framework

Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly endless stream of software security vulnerabilities. Security research has produced numerous access control mechanisms that help improve system security; however, there is little consensus on the best solution. Many powerful security systems have been implemented as research prototypes or highly sp...

متن کامل

Linux Distributed Security Module

Currently implemented security mechanisms rely on discretionary access control mechanisms. These mechanisms, however, are inadequate to protect against the various kinds of attacks in today's complex environments. The access decisions are based on user identity and ownership. Consequently, these mechanisms are easy to bypass and malicious applications can easily cause failures and breaches in s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Datenschutz und Datensicherheit - DuD

سال: 2009

ISSN: 1614-0702,1862-2607

DOI: 10.1007/s11623-009-0145-9