Secure peripheral cards
Sean Smith
sws at cs.dartmouth.edu
Wed Mar 20 22:23:11 EST 2002
Well, there's always the IBM 4758, which we built as a general-purpose
secure computer environment for hostile environments, with the ability
for on-device applications to prove to the outside world what they are
and where they're running.
IBM's been marketing it primarily as a crypto accelerator, unfortunately.
The official product pages make it hard to distinguish the box from the
CCA application sw.
For basic architecture stuff:
S.W. Smith, S.H. Weingart.
`Building a High-Performance, Programmable Secure Coprocessor.''
Computer Networks (Special Issue on Computer Network Security.) 31: 831-860.
April 1999.
For some recent creative applications:
S. Jiang, S.W. Smith, K. Minami.
``Securing Web Servers against Insider Attack.''
ACSA/ACM Annual Computer Security Applications Conference. December 2001
A. Iliev, S.W. Smith.
Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer.
Privacy-Enhancing Technology 2002, Springer-Verlag, to appear.
These and more live at:
http://www.cs.dartmouth.edu/~sws/papers/
--Sean
Prof. Sean W. Smith sws at cs.dartmouth.edu
http://www.cs.dartmouth.edu/~sws/ (has ssl link to pgp key)
Department of Computer Science, Dartmouth College, Hanover NH USA
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list