Feature’s Classification of Hardware-Software Unites of Trusted Boot
This paper aims of identifying the main and additional features of hardware-software unites of trusted boot, while confirming the need to evaluate their impact on the protection efficiency against unauthorized access and offering ways of classifying them.
Main Authors: | Elizaveta Aleksandrovna Belyaeva, Alexey Albertovich Modestov |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2013-09-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/322 |
Similar Items
-
Valuation Method for Hardware-Software Unites of Trusted Boot
by: Aleksey Albertovich Modestov, et al.
Published: (2015-03-01) -
Complex Assessment of the Functionality of Hardware-Software Modules for Trusted Boot
by: Elizaveta Alexandrovna Belyaeva
Published: (2013-02-01) -
A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control
by: Jinshan Shi, et al.
Published: (2020-01-01) -
Formulation and Solution the Tasks of Protection the Information from Unauthorised Access
by: Konstantin Scheglov, et al.
Published: (2016-04-01) -
Evaluation of the IT-security level of network videosurveillance
by: V. V. Malikov
Published: (2019-06-01)