Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information
Document Type
Conference Proceeding
Publication Date
2008
Abstract
There are many current classifications and taxonomies relating to computer security. One missing classification is the Trustworthiness of Information being received by the security system, which we define. This new classification along with Timeliness of Detection and Security level of the Security System present motivation for hardware-based security solutions. Including hardware is not an automatic solution to the limitations of software solutions. Advantages are only gained from hardware through design that ensures at least First-hand Information, dedicated monitors, explicit hardware communication, dedicated storage, and dedicated security processors. Abstract © Springer
DOI
10.1007/978-3-540-79966-5_3
Source Publication
Lecture Notes in Computer Science, vol. 5019
Recommended Citation
Judge, M., Williams, P., Kim, Y., & Mullins, B. (2008). Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information. In J. A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, & K. Markantonakis (Eds.), Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. WISTP 2008 (LNCS, vol. 5019, pp. 36–48). Berlin: Springer. https://doi.org/10.1007/978-3-540-79966-5_3
Comments
The "Link to Full Text" on this page loads the PDF of the chapter, furnished through the Springer Nature SharedIt content-sharing initiative. The publisher retains permissions to re-use and distribute this paper in LNCS vol. 5019.
© IFIP International Federation for Information Processing 2008