112,13 €
124,59 €
-10% with code: EXTRA
Security Policy in System-On-Chip Designs
Security Policy in System-On-Chip Designs
112,13
124,59 €
  • We will send in 10–14 business days.
This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, in…
124.59
  • Publisher:
  • ISBN-10: 3319934635
  • ISBN-13: 9783319934631
  • Format: 15.6 x 23.4 x 1 cm, kieti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Security Policy in System-On-Chip Designs (e-book) (used book) | bookbook.eu

Reviews

(5.00 Goodreads rating)

Description

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.

  • Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
  • Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
  • Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
  • Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field;
  • Includes discussion of current and emerging approaches for security policy verification.

EXTRA 10 % discount with code: EXTRA

112,13
124,59 €
We will send in 10–14 business days.

The promotion ends in 22d.12:03:41

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,25 Book Euros!?
  • Author: Sandip Ray
  • Publisher:
  • ISBN-10: 3319934635
  • ISBN-13: 9783319934631
  • Format: 15.6 x 23.4 x 1 cm, kieti viršeliai
  • Language: English English

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.

  • Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
  • Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
  • Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
  • Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field;
  • Includes discussion of current and emerging approaches for security policy verification.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)