Loading...

Security basics for computer architects /

Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities...

Full description

Bibliographic Details
Main Author: Lee, Ruby B. (Author)
Format: eBook
Language:English
Published: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2013.
Series:Synthesis digital library of engineering and computer science.
Synthesis lectures in computer architecture ; # 25.
Subjects:
Online Access:Abstract with links to full text
LEADER 06653nam a2200721 i 4500
001 201305CAC025
005 20160320103534.0
006 m eo d
007 cr cn |||m|||a
008 131017s2013 caua foab 000 0 eng d
020 |a 9781627051569  |q (electronic bk.) 
020 |z 9781627051552  |q (pbk.) 
024 7 |a 10.2200/S00512ED1V01Y201305CAC025  |2 doi 
035 |a (CaBNVSL)swl00402800 
035 |a (OCoLC)860910124 
040 |a CaBNVSL  |b eng  |e rda  |c CaBNVSL  |d CaBNVSL 
050 4 |a QA76.9.A25  |b L447 2013 
082 0 4 |a 005.8  |2 23 
100 1 |a Lee, Ruby B.,  |e author. 
245 1 0 |a Security basics for computer architects /  |c Ruby B. Lee. 
264 1 |a San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :  |b Morgan & Claypool,  |c 2013. 
300 |a 1 PDF (xv, 95 pages) :  |b illustrations. 
336 |a text  |2 rdacontent 
337 |a electronic  |2 isbdmedia 
338 |a online resource  |2 rdacarrier 
490 1 |a Synthesis lectures on computer architecture,  |x 1935-3243 ;  |v # 25 
500 |a Part of: Synthesis digital library of engineering and computer science. 
500 |a Series from website. 
504 |a Includes bibliographical references (pages 83-94). 
505 0 |a 1. Threat-based design -- 1.1 Security properties -- 1.1.1 Cornerstone security properties -- 1.1.2 Access control -- 1.1.3 Trustworthy versus trusted -- 1.2 Threats and attacks -- 1.3 Countermeasures and defenses -- 1.4 Threat model -- 1.5 Security architecture design methodology --  
505 8 |a 2. Security policy models -- 2.1 Multi-level security policies -- 2.1.1 Bell La Padula (BLP) for confidentiality -- 2.1.2 Biba for integrity -- 2.1.3 Examples -- 2.1.4 MLS security levels and privilege levels -- 2.2 Multi-lateral security policies -- 2.2.1 Chinese wall -- 2.2.2 Clark-Wilson -- 2.2.3 BLP with codewords -- 2.2.4 Electronic medical records --  
505 8 |a 3. Access control -- 3.1 Authentication -- 3.1.1 Passwords and passphrases -- 3.1.2 Biometrics -- 3.1.3 Private keys and security tokens -- 3.1.4 False negatives and false positives -- 3.2 Authorization --  
505 8 |a 4. Cryptography for confidentiality and integrity -- 4.1 Symmetric key ciphers -- 4.1.1 Substitution and permutation ciphers -- 4.1.2 One time pad -- 4.1.3 Stream ciphers -- 4.1.4 Block ciphers -- 4.1.5 Processor enhancements for crypto -- 4.1.6 Cipher modes of operation -- 4.1.7 Importance of key management -- 4.1.8 Computer architecture example: SP -- 4.2 Cryptographic hash functions -- 4.2.1 Properties of cryptographic hash functions -- 4.2.2 Collision resistance and the birthday paradox -- 4.2.3 Hash functions for integrity -- 4.2.4 Keyed-hash or MAC -- 4.2.5 Hash trees -- 4.2.6 Use of block ciphers as hash functions -- 4.2.7 Examples of use -- 4.2.8 Computer architecture examples -- 4.3 More on the birthday paradox (optional) --  
505 8 |a 5. Public-key cryptography -- 5.1 Digital signature -- 5.2 Non-repudiation -- 5.3 Public-private key-pairs -- 5.4 Public-key ciphers -- 5.4.1 RSA -- 5.4.2 Other public-key cryptography algorithms -- 5.5 Uses of public-key cryptography -- 5.6 Public-key infrastructure (PKI) -- 5.6.1 Public-key certificates and certificate authorities -- 5.6.2 Types of public-key infrastructures -- 5.6.3 Web of trust -- 5.7 Efficient use of public-key and symmetric-key crypto -- 5.8 Example: secure sockets layer -- 5.9 Computer architecture example: bastion -- 5.10 Misunderstanding public-key crypto --  
505 8 |a 6. Security protocols -- 6.1 Protocol notation -- 6.2 Challenge-response protocols -- 6.3 Protocol attacks -- 6.4 Real-world protocols -- 6.5 Verifying security protocols -- 7. Summary -- 7.1 Security applications -- 7.2 Research topics in hardware security -- 7.3 The road ahead --  
505 8 |a Bibliography -- Appendix: further readings -- A.1. Dynamic information flow tracking (DIFT) papers -- A.2. Secure processor papers -- A.3. Memory integrity tree papers -- Author's biography. 
506 |a Abstract freely available; full-text restricted to subscribers or individual document purchasers. 
510 0 |a Compendex 
510 0 |a Google book search 
510 0 |a Google scholar 
510 0 |a INSPEC 
520 3 |a Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures. The book is also written to be accessible to a more general audience interested in the basic security technologies that can be used to improve cyber security. By understanding the concepts behind the security terminology, the interested reader would understand more clearly the frequent security breaches being reported in the news and be able to critique or even help propose effective security solutions. 
530 |a Also available in print. 
538 |a Mode of access: World Wide Web. 
538 |a System requirements: Adobe Acrobat Reader. 
588 |a Title from PDF title page (viewed on October 17, 2013). 
650 0 |a Computer security. 
653 |a access control 
653 |a computer security 
653 |a confidentiality and integrity 
653 |a cryptography 
653 |a hardware security 
653 |a secure processors 
653 |a secure protocols 
653 |a security policies 
653 |a trustworthy computing 
776 0 8 |i Print version:  |z 9781627051552 
830 0 |a Synthesis digital library of engineering and computer science. 
830 0 |a Synthesis lectures in computer architecture ;  |v # 25.  |x 1935-3243 
856 4 8 |3 Abstract with links to full text  |u http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025 
942 |c EB 
999 |c 81068  |d 81068 
952 |0 0  |1 0  |4 0  |7 0  |9 73088  |a MGUL  |b MGUL  |d 2016-03-20  |l 0  |r 2016-03-20  |w 2016-03-20  |y EB