Showing 49 - 56 of 61
Military & Aerospace Electronics

Developing a Secure COTS-based Trusted Computing System: An Introduction

Security and trusted computing, at the end of the day, really are all about the system. While the pieces and parts, such as the individual modules, operating system, and boot software, all are important, system security is not an additive process; it can’t simply be bolted-on to make the system secure.

07/25/2018
Military & Aerospace Electronics

Trusted Computing Article: Application Development, Testing, and Analysis for Optimal Security

We look at Trusted Computing in application development, testing, and analysis for optimal security.

06/27/2018
Military & Aerospace Electronics

Computer Hardware's Role in Securing Operating Systems and Hypervisors in Trusted Computing Applications

Many software applications run on “least privilege,” which means that software only receives minimal access to hardware, other applications, and other system resources.

05/30/2018
Military & Aerospace Electronics

Trusted Computing Hardware Features for Maintaining Cyber Security During Operation

We look at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.

04/25/2018
Military & Aerospace Electronics

Trusted Boot: A Key Strategy for Ensuring the Trustworthiness of an Embedded Computing System

Steve Edwards looks at how Trusted Boot is a key strategy for ensuring the trustworthiness of an embedded computing system against cyber attacks.

04/25/2018
Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX Single Board Computer.

04/03/2018
Military & Aerospace Electronics

COTS-Based Trusted Computing: Getting Started in Next-Generation Mission-Critical Electronics

Trusted computing involves technologies protect mission-critical embedded electronics from physical and remote attacks and from hardware and software failures.

02/21/2018
trusted computing security

Trusted Computing: A Layered Approach to Security

Aaron Frank looks at how security must be implemented at every layer of each solution to create a system that can be fully trusted.

01/30/2018