Location:Home > Engineering science > Computer Science > Computer Science and Technology > The Design and Implementation of Security Mechanism of Embedded Dependable Computer
Details
Name

The Design and Implementation of Security Mechanism of Embedded Dependable Computer

Downloads: []
Author
Tutor: LiuHongWei
School: Harbin Institute of Technology
Course: Computer Science and Technology
Keywords: Dependable computing,Security,Security co-process module,TMS320VC5416
CLC: TP309
Type: Master's thesis
Year:  2008
Facebook Google+ Email Gmail Evernote LinkedIn Twitter Addthis

not access Image Error Other errors

Abstract:
As computer systems are widely used in the high dependability-critical fields such as aerospace, military and industry, the dependability of the computer system is becoming increasingly important. Now the designing and implementation technique of dependable computer is one of the most important research fields. The research on security, one of the important characters of dependable computer, is becoming increasingly important.In this paper the designing and implementation technique of dependable computer is firstly introduced. Then the security requirements of embedded dependable computer are analyzed. The security mechanism of embedded dependable computer is analyzed and designed. The security co-process module is added to the traditional architecture of embedded computer system. The architecture of the security co-process module is designed. By hardware and software cooperation the security mechanism is implemented.TMS320VC5416 is selected as the processer of the security co-process card. Sharing memory is selected as the way of communication between co-process card and host platform. Then the hardware of the security co-process module is particularly designed and implemented. Then system management software of the card is designed and implemented. The security card driver on S3C44B0X platform is implemented. The security co-process card provides the security related commands for the host platform. Finally this paper gives a test on the security co-process module. The implementation of security co-process module satisfies the requirements of embedded dependable computer system and also makes contribution to the implementation of security enhanced system software and security enhanced anplication software of embedded dependable computer system.
Related Dissertations
Last updated
Sponsored Links
Home |About Us| Contact Us| Feedback| Privacy | copyright | Back to top