Valuation Method for Hardware-Software Unites of Trusted Boot
The science-based approach to obtaining integrated assessment of features for hardware-software unites of trusted boot based on an algorithm of receiving a comprehensive measure to assess the effectiveness of protection against unauthorized access and comparative evaluation methodology by “cost — ef...
Main Authors: | Aleksey Albertovich Modestov, Elizaveta Alexandrovna Belyaeva |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2015-03-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/205 |
Similar Items
-
Feature’s Classification of Hardware-Software Unites of Trusted Boot
by: Elizaveta Aleksandrovna Belyaeva, et al.
Published: (2013-09-01) -
Complex Assessment of the Functionality of Hardware-Software Modules for Trusted Boot
by: Elizaveta Alexandrovna Belyaeva
Published: (2013-02-01) -
A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control
by: Jinshan Shi, et al.
Published: (2020-01-01) -
Evaluation of the IT-security level of network videosurveillance
by: V. V. Malikov
Published: (2019-06-01) -
A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network
by: Pavani V L
Published: (2018-12-01)