Results 251 to 260 of about 139,929 (306)

Module-OT: A Hardware Security Module for Operational Technology

2020 IEEE Texas Power and Energy Conference (TPEC), 2020
Increased penetration levels of renewable energy and other types of distributed energy resources (DERs) on the modern electric grid-combined with technological advancements for electric system monitoring and control-introduce new cyberattack vectors and increase the cyberattack surface of energy systems. According to the IEEE Std.
William Hupp   +3 more
openaire   +3 more sources

A Trusted IaaS Environment with Hardware Security Module

IEEE Transactions on Services Computing, 2016
With the proliferation of cloud computing, security concerns about confidentiality violations of user data by the privileged domain and system administrators have been growing. This paper proposes secure cloud architecture with a hardware security module, which isolates cloud user data from potentially malicious privileged domains or cloud ...
Jinho Seol   +4 more
openaire   +3 more sources

Analysis of a hardware security module's high-availability setting

IEEE Security & Privacy, 2013
Analysis of a hardware security module (HSM) revealed two flaws that could lead to security problems. The first involved key deletion; the second involved unauthorized members of a group of HSMs. Neither flaw is probably fatal, if organizations develop organizational ways to work around it.
Benedikt Koppel, Stephan Neuhaus
openaire   +3 more sources

Poor Man's Hardware Security Module (pmHSM)

open access: closedProceedings of the 9th Latin America Networking Conference, 2016
The DNS Security Extensions (DNSSEC) add a new layer of security based on public-key infrastructure: each DNS record is digitally signed to verify the authenticity of the answer. However, the introduction of DNSSEC has an impact in the operational workflow of DNS systems: (i) signatures have an expiration date, hence the records must be periodically ...
Francisco Cifuentes   +5 more
openalex   +2 more sources

A hardware security module for quadrotor communication

open access: closed2012 International Conference on Field-Programmable Technology, 2012
This paper presents a hardware architecture for secure quadrotor communication. Both, the control data sent by the ground station and the information data sent by the quadrotor are encrypted and authenticated. The system is implemented on an FPGA and integrated on an extension board.
Abdulhadi Shoufan
openalex   +2 more sources

Toward scaling hardware security module for emerging cloud services

open access: closedProceedings of the 4th Workshop on System Software for Trusted Execution, 2019
The hardware security module (HSM) has been used as a root of trust for various key management services. At the same time, rapid innovation in emerging industries, such as container-based microservices, accelerates demands for scaling security services.
Juhyeng Han   +3 more
openalex   +2 more sources

A portable hardware security module and cryptographic key generator

Journal of Information Security and Applications, 2022
Malik Hamza Murtaza   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy