Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores

Secure canonical upgrade policies are multilevel relabel policies that, under certain conditions, allow high-level subjects to update low-level security labels. This paper describes a scheme whereby these policies can be supported within the Message Filter Model for multilevel secure object-oriented database management systems.

متن کامل

System-on-System(SoS) Architecture for Secure Bio-medical Imaging

This paper presents an integrated approach towards implementation of a multilayered architecture based upon stacked silicon for image capture and secure data transmission suitable for bio-medical devices and implementation within patient-point-of-care network. The system architecture is comprised of a CMOS based image sensor layer, memory layer, 3D-DWT (Three-dimensional Discrete Wavelet Transf...

متن کامل

A Secure Kernelized Architecture for Multiple Object-Oriented Databases

We present a secure kernelized architecture for multilevel object-oriented database management systems. Our architecture is based on the notion of a message lter proposed by Jajodia and Kogan. It builds upon the typical architecture of current object-oriented database management systems. Since the operations mediated by the message lter are arbitrarily complex operations (as opposed to primitiv...

متن کامل

A Secure Kernelized Architecture for Multilevel Object-oriented Databases

We present a secure kernelized architecture for mul-tilevel object-oriented database management systems. Our architecture is based on the notion of a message lter proposed by Jajodia and Kogan. It builds upon the typical architecture of current object-oriented database management systems. Since the operations mediated by the message lter are arbitrarily complex operations (as opposed to primiti...

متن کامل

Sikker: A Distributed System Architecture for Secure High Performance Computing

After decades of evolution, the network requirements of data centers, supercomputers, and cloud computing facilities are beginning to converge requiring high performance network access while supporting a secure computing environment for numerous concurrently running applications with complex interaction policies. Unfortunately, current network technologies are unable to simultaneously provide h...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computers

سال: 2016

ISSN: 1796-203X

DOI: 10.17706/jcp.11.3.189-194