Keyword Search
Advanced Search
Computer Science and Engineering  Information Security - II
Title: Information Security - II
Department: Computer Science and Engineering
Author: Prof. V. Kamakoti
University: IIT Madras
Type: WebLink
Abstract: Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and Power PC based architectures as case studies to explain the concepts.
Bodhbridge, Copyright © 2009 All rights reserved., is a portal by BodhBridge ESPL.