1987 IEEE Symposium on Security and Privacy 1987
DOI: 10.1109/sp.1987.10019
|View full text |Cite
|
Sign up to set email alerts
|

Physical Security for the μABYSS System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

1994
1994
2013
2013

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 2 publications
0
17
0
Order By: Relevance
“…A good example here is IBM's Citadel prototype [Pa92]; another is the new ISA-bus version of Fortezza. These devices provide the best security and computational ability of which we are aware; in the case of the IBM Citadel, the circuitry is wrapped with nichrome wire whose penetration triggers zeroization, and a 386, a megabyte RAM, and high-speed DES engine all reside within the secure envelope [Wein87,Yee94] Although the term "smart card" is often used for nearly every item in this list, we conform to the general standard of using it only for IC chip cards. (To underscore the difference, some wags have suggested the term "smart-ass card" for the more powerful secure coprocessors.…”
Section: Smart Disksmentioning
confidence: 99%
“…A good example here is IBM's Citadel prototype [Pa92]; another is the new ISA-bus version of Fortezza. These devices provide the best security and computational ability of which we are aware; in the case of the IBM Citadel, the circuitry is wrapped with nichrome wire whose penetration triggers zeroization, and a 386, a megabyte RAM, and high-speed DES engine all reside within the secure envelope [Wein87,Yee94] Although the term "smart card" is often used for nearly every item in this list, we conform to the general standard of using it only for IC chip cards. (To underscore the difference, some wags have suggested the term "smart-ass card" for the more powerful secure coprocessors.…”
Section: Smart Disksmentioning
confidence: 99%
“…We cannot secure an entire workstation-even if we could, we could not secure the user! Secure coprocessors are being rapidly deployed; there are now several commercial secure coprocessor procucts available from IBM ( ABYSS [Wein87], Citadel [WWAP91]) and other vendors. Transforming this small amount of physical security into a larger secure protocol raises some subtle issues.…”
Section: Secure Coprocessorsmentioning
confidence: 99%
“…It is possible to build physical security systems to protect sensitive data [12,5,6,15] These systems can make unauthorized access to the data difficult, as a bank vault makes stealing cash a daunting task (tamper resistant). They can trigger mechanisms to thwart the attack, much like an alarm system (tamper responding).…”
Section: Introductionmentioning
confidence: 99%