Loading...
Security basics for computer architects /
Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Morgan & Claypool,
2013.
|
Series: | Synthesis digital library of engineering and computer science.
Synthesis lectures in computer architecture ; # 25. |
Subjects: | |
Online Access: | Abstract with links to full text |
LEADER | 06656nam a2200721 i 4500 | ||
---|---|---|---|
001 | 201305CAC025 | ||
005 | 20161114165119.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 131017s2013 caua foab 000 0 eng d | ||
020 | |a 9781627051569 |q (electronic bk.) | ||
020 | |z 9781627051552 |q (pbk.) | ||
024 | 7 | |a 10.2200/S00512ED1V01Y201305CAC025 |2 doi | |
035 | |a (CaBNVSL)swl00402800 | ||
035 | |a (OCoLC)860910124 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b L447 2013 | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Lee, Ruby B., |e author. | |
245 | 1 | 0 | |a Security basics for computer architects / |c Ruby B. Lee. |
264 | 1 | |a San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : |b Morgan & Claypool, |c 2013. | |
300 | |a 1 PDF (xv, 95 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Synthesis lectures on computer architecture, |x 1935-3243 ; |v # 25 | |
500 | |a Part of: Synthesis digital library of engineering and computer science. | ||
500 | |a Series from website. | ||
504 | |a Includes bibliographical references (pages 83-94). | ||
505 | 0 | |a 1. Threat-based design -- 1.1 Security properties -- 1.1.1 Cornerstone security properties -- 1.1.2 Access control -- 1.1.3 Trustworthy versus trusted -- 1.2 Threats and attacks -- 1.3 Countermeasures and defenses -- 1.4 Threat model -- 1.5 Security architecture design methodology -- | |
505 | 8 | |a 2. Security policy models -- 2.1 Multi-level security policies -- 2.1.1 Bell La Padula (BLP) for confidentiality -- 2.1.2 Biba for integrity -- 2.1.3 Examples -- 2.1.4 MLS security levels and privilege levels -- 2.2 Multi-lateral security policies -- 2.2.1 Chinese wall -- 2.2.2 Clark-Wilson -- 2.2.3 BLP with codewords -- 2.2.4 Electronic medical records -- | |
505 | 8 | |a 3. Access control -- 3.1 Authentication -- 3.1.1 Passwords and passphrases -- 3.1.2 Biometrics -- 3.1.3 Private keys and security tokens -- 3.1.4 False negatives and false positives -- 3.2 Authorization -- | |
505 | 8 | |a 4. Cryptography for confidentiality and integrity -- 4.1 Symmetric key ciphers -- 4.1.1 Substitution and permutation ciphers -- 4.1.2 One time pad -- 4.1.3 Stream ciphers -- 4.1.4 Block ciphers -- 4.1.5 Processor enhancements for crypto -- 4.1.6 Cipher modes of operation -- 4.1.7 Importance of key management -- 4.1.8 Computer architecture example: SP -- 4.2 Cryptographic hash functions -- 4.2.1 Properties of cryptographic hash functions -- 4.2.2 Collision resistance and the birthday paradox -- 4.2.3 Hash functions for integrity -- 4.2.4 Keyed-hash or MAC -- 4.2.5 Hash trees -- 4.2.6 Use of block ciphers as hash functions -- 4.2.7 Examples of use -- 4.2.8 Computer architecture examples -- 4.3 More on the birthday paradox (optional) -- | |
505 | 8 | |a 5. Public-key cryptography -- 5.1 Digital signature -- 5.2 Non-repudiation -- 5.3 Public-private key-pairs -- 5.4 Public-key ciphers -- 5.4.1 RSA -- 5.4.2 Other public-key cryptography algorithms -- 5.5 Uses of public-key cryptography -- 5.6 Public-key infrastructure (PKI) -- 5.6.1 Public-key certificates and certificate authorities -- 5.6.2 Types of public-key infrastructures -- 5.6.3 Web of trust -- 5.7 Efficient use of public-key and symmetric-key crypto -- 5.8 Example: secure sockets layer -- 5.9 Computer architecture example: bastion -- 5.10 Misunderstanding public-key crypto -- | |
505 | 8 | |a 6. Security protocols -- 6.1 Protocol notation -- 6.2 Challenge-response protocols -- 6.3 Protocol attacks -- 6.4 Real-world protocols -- 6.5 Verifying security protocols -- 7. Summary -- 7.1 Security applications -- 7.2 Research topics in hardware security -- 7.3 The road ahead -- | |
505 | 8 | |a Bibliography -- Appendix: further readings -- A.1. Dynamic information flow tracking (DIFT) papers -- A.2. Secure processor papers -- A.3. Memory integrity tree papers -- Author's biography. | |
506 | |a Abstract freely available; full-text restricted to subscribers or individual document purchasers. | ||
510 | 0 | |a Compendex | |
510 | 0 | |a Google book search | |
510 | 0 | |a Google scholar | |
510 | 0 | |a INSPEC | |
520 | 3 | |a Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures. The book is also written to be accessible to a more general audience interested in the basic security technologies that can be used to improve cyber security. By understanding the concepts behind the security terminology, the interested reader would understand more clearly the frequent security breaches being reported in the news and be able to critique or even help propose effective security solutions. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
538 | |a System requirements: Adobe Acrobat Reader. | ||
588 | |a Title from PDF title page (viewed on October 17, 2013). | ||
650 | 0 | |a Computer security. | |
653 | |a access control | ||
653 | |a computer security | ||
653 | |a confidentiality and integrity | ||
653 | |a cryptography | ||
653 | |a hardware security | ||
653 | |a secure processors | ||
653 | |a secure protocols | ||
653 | |a security policies | ||
653 | |a trustworthy computing | ||
776 | 0 | 8 | |i Print version: |z 9781627051552 |
830 | 0 | |a Synthesis digital library of engineering and computer science. | |
830 | 0 | |a Synthesis lectures in computer architecture ; |v # 25. |x 1935-3243 | |
856 | 4 | 8 | |3 Abstract with links to full text |u http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025 |
942 | |c EB | ||
999 | |c 114271 |d 114271 | ||
952 | |0 0 |1 0 |4 0 |7 0 |9 111031 |a MGUL |b MGUL |d 2016-11-14 |l 0 |r 2016-11-14 |w 2016-11-14 |y EB |