An Architecture of Security Management Unit for Safe Hosting of Multiple Agents

نویسندگان

  • Tanguy Gilmont
  • Jean-Didier Legat
چکیده

In such growing areas as remote applications in large public networks, intelligent agent support, intellectual property and copyright protection, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards, java cards). This paper proposes an architecture allowing ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The deciphering unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architecture of security management unit for safe hosting of multiple agents

In such growing areas as remote applications in large public networks, intelligent agent support, intellectual property and copyright protection, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing pow...

متن کامل

A virtual machine architecture for IT-security laboratories

This thesis discusses challenges in IT security education, points out a gap between e-learning and practical education, and presents a work to fill the gap. E-learning is a flexible and personalized alternative to traditional education. Nonetheless, existing e-learning systems for IT security education have difficulties in delivering hands-on experience because of the lack of proximity. Laborat...

متن کامل

Study on the impact of multiple prevention strategies on COVID-19 pandemic

Background:Today, with the coronavirus pandemic, the governments and international institutions are rapidly taking various approaches to infection control. In the meantime, the care of healthcare workers who are responsible for the health and treatment of patients is very important. The COVID-19 epidemic in China has achieved a great victory, and it is important to summarize the successful anti...

متن کامل

Intelligent Energy Management System for Office Buildings Using Traffic Control System

Rapid advances in new sciences and technologies result in high penetration of smart devices and services in daily life. In this regard, smart buildings are one of the prominent examples which have dramatically improved not only the accuracy and efficiency of buildings but also the speed of daily routines. Recently, integration of the cutting-edge technologies has been traversing from residentia...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998