Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing
نویسندگان
چکیده
منابع مشابه
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores
Secure canonical upgrade policies are multilevel relabel policies that, under certain conditions, allow high-level subjects to update low-level security labels. This paper describes a scheme whereby these policies can be supported within the Message Filter Model for multilevel secure object-oriented database management systems.
متن کاملSystem-on-System(SoS) Architecture for Secure Bio-medical Imaging
This paper presents an integrated approach towards implementation of a multilayered architecture based upon stacked silicon for image capture and secure data transmission suitable for bio-medical devices and implementation within patient-point-of-care network. The system architecture is comprised of a CMOS based image sensor layer, memory layer, 3D-DWT (Three-dimensional Discrete Wavelet Transf...
متن کاملA Secure Kernelized Architecture for Multiple Object-Oriented Databases
We present a secure kernelized architecture for multilevel object-oriented database management systems. Our architecture is based on the notion of a message lter proposed by Jajodia and Kogan. It builds upon the typical architecture of current object-oriented database management systems. Since the operations mediated by the message lter are arbitrarily complex operations (as opposed to primitiv...
متن کاملA Secure Kernelized Architecture for Multilevel Object-oriented Databases
We present a secure kernelized architecture for mul-tilevel object-oriented database management systems. Our architecture is based on the notion of a message lter proposed by Jajodia and Kogan. It builds upon the typical architecture of current object-oriented database management systems. Since the operations mediated by the message lter are arbitrarily complex operations (as opposed to primiti...
متن کاملSikker: A Distributed System Architecture for Secure High Performance Computing
After decades of evolution, the network requirements of data centers, supercomputers, and cloud computing facilities are beginning to converge requiring high performance network access while supporting a secure computing environment for numerous concurrently running applications with complex interaction policies. Unfortunately, current network technologies are unable to simultaneously provide h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computers
سال: 2016
ISSN: 1796-203X
DOI: 10.17706/jcp.11.3.189-194