[PDF][PDF] A Secure Running Environment for Multiple Platforms.
R Savola - ICSOFT (2), 2009 - scitepress.org
R Savola
ICSOFT (2), 2009•scitepress.orgAt present, the security critical operations of terminal devices are often being executed in the
operating system, which may include security vulnerabilities due to implementation faults, for
example. These vulnerabilities leave the system open to data leaks and attacks from viruses
or other harmful programs. The European€-Confidential ITEA research project is developing
device-independent, next-generation security solutions for software platforms. Critical
operations are executed on a simple platform where the security operations are isolated in a …
operating system, which may include security vulnerabilities due to implementation faults, for
example. These vulnerabilities leave the system open to data leaks and attacks from viruses
or other harmful programs. The European€-Confidential ITEA research project is developing
device-independent, next-generation security solutions for software platforms. Critical
operations are executed on a simple platform where the security operations are isolated in a …
Abstract
At present, the security critical operations of terminal devices are often being executed in the operating system, which may include security vulnerabilities due to implementation faults, for example. These vulnerabilities leave the system open to data leaks and attacks from viruses or other harmful programs. The European€-Confidential ITEA research project is developing device-independent, next-generation security solutions for software platforms. Critical operations are executed on a simple platform where the security operations are isolated in a separate module, which can be physically located in a terminal device or in a separate device such as a memory stick. This paper introduces a Secure Running Environment (SRE), in which the core security management of the platform is located. This contains sensible parts for the security of the operating system, middleware and applications. The security platform alone does not guarantee an adequate level of security. Security is a challenging and interdisciplinary field that demands holistic understanding, and validation of the realization of the security objectives and the solutions advancing them. The most common methods for security assurance are security analysis, security testing and security monitoring.
scitepress.org
Showing the best result for this search. See all results