Configurable and secure system architectures
In this paper we introduce a novel approach for host protection based on a security subsystem for continuous monitoring and control of user applications. To enable a secure monitoring capability, a strict hardware separation is proposed, in combination with a signaling layer for monitoring and control. The paper presents our preliminary work, introducing some of the core ideas and discussing a few scenarios and applications. © 2010 IEEE.
Proceedings - 2nd Vaagdevi International Conference on Information Technology for Real World Problems, VCON 2010
Dasgupta, D., & Carvalho, M. (2010). Configurable and secure system architectures. Proceedings - 2nd Vaagdevi International Conference on Information Technology for Real World Problems, VCON 2010, 57-62. https://doi.org/10.1109/VCON.2010.18