Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information

Document Type

Conference Proceeding

Publication Date

2008

Abstract

There are many current classifications and taxonomies relating to computer security. One missing classification is the Trustworthiness of Information being received by the security system, which we define. This new classification along with Timeliness of Detection and Security level of the Security System present motivation for hardware-based security solutions. Including hardware is not an automatic solution to the limitations of software solutions. Advantages are only gained from hardware through design that ensures at least First-hand Information, dedicated monitors, explicit hardware communication, dedicated storage, and dedicated security processors. Abstract © Springer

Comments

The "Link to Full Text" on this page loads the PDF of the chapter, furnished through the Springer Nature SharedIt content-sharing initiative. The publisher retains permissions to re-use and distribute this paper in LNCS vol. 5019.

© IFIP International Federation for Information Processing 2008

DOI

10.1007/978-3-540-79966-5_3

Source Publication

Lecture Notes in Computer Science, vol. 5019

Share

COinS