loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Author: Reijo M. Savola

Affiliation: VTT Technical Research Centre of Finland, Finland

ISBN: 978-989-674-010-8

Keyword(s): Secure operating environment, Security assurance, Security metrics.

Related Ontology Subjects/Areas/Topics: Biomedical Engineering ; Communication and Software Technologies and Architectures ; Computer-Supported Education ; Distributed and Mobile Software Systems ; e-Business ; Enterprise Information Systems ; Health Engineering and Technology Applications ; Health Information Systems ; Information Technologies Supporting Learning ; Mobile and Pervasive Computing ; Mobile Technologies ; Mobile Technologies for Healthcare Applications ; Neural Rehabilitation ; Neurotechnology, Electronics and Informatics ; Security and Privacy ; Software Engineering ; Telecommunications

Abstract: At present, the security critical operations of terminal devices are often being executed in the operating system, which may include security vulnerabilities due to implementation faults, for example. These vulnerabilities leave the system open to data leaks and attacks from viruses or other harmful programs. The European €-Confidential ITEA research project is developing device-independent, next-generation security solutions for software platforms. Critical operations are executed on a simple platform where the security operations are isolated in a separate module, which can be physically located in a terminal device or in a separate device such as a memory stick. This paper introduces a Secure Running Environment (SRE), in which the core security management of the platform is located. This contains sensible parts for the security of the operating system, middleware and applications. The security platform alone does not guarantee an adequate level of security. Security is a challengi ng and interdisciplinary field that demands holistic understanding, and validation of the realization of the security objectives and the solutions advancing them. The most common methods for security assurance are security analysis, security testing and security monitoring. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.175.180.108

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
M. Savola R. and (2009). A SECURE RUNNING ENVIRONMENT FOR MULTIPLE PLATFORMS.In Proceedings of the 4th International Conference on Software and Data Technologies - Volume 2: ICSOFT, ISBN 978-989-674-010-8, pages 129-134. DOI: 10.5220/0002244201290134

@conference{icsoft09,
author={Reijo {M. Savola}},
title={A SECURE RUNNING ENVIRONMENT FOR MULTIPLE PLATFORMS},
booktitle={Proceedings of the 4th International Conference on Software and Data Technologies - Volume 2: ICSOFT,},
year={2009},
pages={129-134},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002244201290134},
isbn={978-989-674-010-8},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Software and Data Technologies - Volume 2: ICSOFT,
TI - A SECURE RUNNING ENVIRONMENT FOR MULTIPLE PLATFORMS
SN - 978-989-674-010-8
AU - M. Savola, R.
PY - 2009
SP - 129
EP - 134
DO - 10.5220/0002244201290134

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.