[10584] in cryptography@c2.net mail archive
Re: Secure peripheral cards
daemon@ATHENA.MIT.EDU (Sean Smith)
Wed Mar 20 22:31:42 2002
Message-Id: <200203210323.g2L3NBj13014@chipotle.cs.dartmouth.edu>
To: cryptography@wasabisystems.com
In-Reply-To: Your message of "Wed, 20 Mar 2002 19:21:14 EST."
<Pine.LNX.4.30.0203201901580.32143-100000@styx.uwaterloo.ca>
From: Sean Smith <sws@cs.dartmouth.edu>
Reply-To: Sean Smith <sws@cs.dartmouth.edu>
Date: Wed, 20 Mar 2002 22:23:11 -0500
Well, there's always the IBM 4758, which we built as a general-purpose
secure computer environment for hostile environments, with the ability
for on-device applications to prove to the outside world what they are
and where they're running.
IBM's been marketing it primarily as a crypto accelerator, unfortunately.
The official product pages make it hard to distinguish the box from the
CCA application sw.
For basic architecture stuff:
S.W. Smith, S.H. Weingart.
`Building a High-Performance, Programmable Secure Coprocessor.''
Computer Networks (Special Issue on Computer Network Security.) 31: 831-860.
April 1999.
For some recent creative applications:
S. Jiang, S.W. Smith, K. Minami.
``Securing Web Servers against Insider Attack.''
ACSA/ACM Annual Computer Security Applications Conference. December 2001
A. Iliev, S.W. Smith.
Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer.
Privacy-Enhancing Technology 2002, Springer-Verlag, to appear.
These and more live at:
http://www.cs.dartmouth.edu/~sws/papers/
--Sean
Prof. Sean W. Smith sws@cs.dartmouth.edu
http://www.cs.dartmouth.edu/~sws/ (has ssl link to pgp key)
Department of Computer Science, Dartmouth College, Hanover NH USA
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com