期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Hardware/Compiler Memory Protection in Sensor Nodes
1
作者 lanfranco lopriore 《International Journal of Communications, Network and System Sciences》 2008年第3期235-240,共6页
With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the mic... With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints that include the implementation of common protection paradigms, efficiency in the distribution and revocation of access privileges, and the lack of a privileged (kernel) mode. 展开更多
关键词 ACCESS Control PROTECTION DOMAIN PROTECTION System Sensor NODE
下载PDF
Reference Encryption for Access Right Segregation and Domain Representation
2
作者 lanfranco lopriore 《Journal of Information Security》 2012年第2期86-90,共5页
With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solu... With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solution based on protected references, each consisting of the identifier of an object and the specification of a collection of access rights for this object. The protection system associates an encryption key with each object and each domain. A protected reference for a given object is always part of a domain, and is stored in memory in the ciphertext form that results from application of a double encryption using both the object key and the domain key. 展开更多
关键词 ACCESS RIGHT DOMAIN Protection Symmetric-Key CRYPTOGRAPHY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部