JTAG Architecture with Multi Level Security
نویسندگان
چکیده
منابع مشابه
Improving the security level of the FUSION@ multi-agent architecture
The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety of problems with regards to security. This article presents the Adaptive Intrusion Detection Multi-agent System (AIDeMaS), a mechanism that has been designed to detect and block...
متن کاملMulti-Level Security Applications
BlueSpace is an enterprise software company, based in Austin, Texas, which creates multi-level secure (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense a...
متن کاملJTAG Security Extension Using Locking Mechanism ( work in progress )
In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;
متن کاملA Security Architecture for Multi-Agent Matchmaking
Using a multi-agent system to match and introduce users who share share interests has important advantages, but handling sensitive data involves a number of design challenges in ensuring user privacy. This paper describes many of them, briefly summarizes some relevant cryptographic technology, and uses this technology to demonstrate how to avoid most of the potential privacy problems without un...
متن کاملA Design of Multi-level Structure Security Architecture on Database Ap- plication System
Database application system mainly exists three aspects of insecurity: insecurity of data storage, fragilities of database application, the risk of secret data in the database. Refer to these three factors,This paper presents a multi-level structure security system, which includes decision-making level, code level, and data encryption level. This design enhances security of database site, secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2012
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-0115459