A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Engineering Sufficiently Secure Computing
2006
Proceedings of the Computer Security Applications Conference
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal verification, and rapidly improving techniques relevant to software defect density estimation. Cryptographic separation protects information in transmission and storage. Formally proven properties of separation kernel based secure virtualization can bound risk for information in processing. Then, within each strongly
doi:10.1109/acsac.2006.25
dblp:conf/acsac/Witten06
fatcat:tclioh6qkna6vkuhzsflauh2sm