Abstract | ||
---|---|---|
Today's computer systems trace their roots to an era of trusted users and highly constrained hardware; thus, their designs fundamentally emphasize performance and discount security. This article presents a vision for how small steps using existing technologies can be combined into one giant leap for computer security. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1109/MSEC.2020.2977586 | IEEE Security & Privacy |
Keywords | DocType | Volume |
Safety,Computer security,Program processors,Hardware,Computer architecture,Computer languages | Journal | 18 |
Issue | ISSN | Citations |
4 | 1540-7993 | 0 |
PageRank | References | Authors |
0.34 | 0 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hamed Okhravi | 1 | 277 | 23.66 |
Nathan Burow | 2 | 42 | 5.53 |
Richard Skowyra | 3 | 41 | 6.54 |
Bryan C. Ward | 4 | 0 | 0.34 |
Samuel Jero | 5 | 58 | 8.15 |
Roger Kazan | 6 | 0 | 0.34 |
Howard E. Shrobe | 7 | 1105 | 280.62 |