Valuation Method for Hardware-Software Unites of Trusted Boot
The science-based approach to obtaining integrated assessment of features for hardware-software unites of trusted boot based on an algorithm of receiving a comprehensive measure to assess the effectiveness of protection against unauthorized access and comparative evaluation methodology by “cost — ef...
Main Authors: | Aleksey Albertovich Modestov, Elizaveta Alexandrovna Belyaeva |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2015-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/205 |
Similar Items
-
Feature’s Classification of Hardware-Software Unites of Trusted Boot
by: Elizaveta Aleksandrovna Belyaeva, et al.
Published: (2013-09-01) -
Complex Assessment of the Functionality of Hardware-Software Modules for Trusted Boot
by: Elizaveta Alexandrovna Belyaeva
Published: (2013-02-01) -
A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control
by: Jinshan Shi, et al.
Published: (2020-01-01) -
Staff supported community outings among forensic mental health patients: patient characteristics, rehabilitative goals, and (the absence of) adverse outcomes
by: Christian Farrell, et al.
Published: (2024-04-01) -
Evaluation of the IT-security level of network videosurveillance
by: V. V. Malikov
Published: (2019-06-01)