Dissertation > Excellent graduate degree dissertation topics show

The Design and Implementation of Security Mechanism of Embedded Dependable Computer

Author: JiaYaoLong
Tutor: LiuHongWei
School: Harbin Institute of Technology
Course: Computer Science and Technology
Keywords: Dependable computing Security Security co-process module TMS320VC5416
CLC: TP309
Type: Master's thesis
Year: 2008
Downloads: 153
Quote: 0
Read: Download Dissertation


As computer systems are widely used in the high dependability-critical fields such as aerospace, military and industry, the dependability of the computer system is becoming increasingly important. Now the designing and implementation technique of dependable computer is one of the most important research fields. The research on security, one of the important characters of dependable computer, is becoming increasingly important.In this paper the designing and implementation technique of dependable computer is firstly introduced. Then the security requirements of embedded dependable computer are analyzed. The security mechanism of embedded dependable computer is analyzed and designed. The security co-process module is added to the traditional architecture of embedded computer system. The architecture of the security co-process module is designed. By hardware and software cooperation the security mechanism is implemented.TMS320VC5416 is selected as the processer of the security co-process card. Sharing memory is selected as the way of communication between co-process card and host platform. Then the hardware of the security co-process module is particularly designed and implemented. Then system management software of the card is designed and implemented. The security card driver on S3C44B0X platform is implemented. The security co-process card provides the security related commands for the host platform. Finally this paper gives a test on the security co-process module. The implementation of security co-process module satisfies the requirements of embedded dependable computer system and also makes contribution to the implementation of security enhanced system software and security enhanced anplication software of embedded dependable computer system.

Related Dissertations

  1. The Research of Digital Lock-In Technology,TN911.8
  2. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  3. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  4. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  5. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  6. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  7. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  8. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  9. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  10. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  11. Comprehensive Evaluation of Ecological Security of Land Application,X826
  12. Study on Evaluation Index System for Land Ecological Security,X826
  13. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  14. Genetically Modified Food Ethics,B82-05
  15. On the systematic construction of the Chinese Communist Party democracy,D262.11
  16. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1
  17. Research on a Fire-fighting Shell for Towers,TU892
  18. Evaluation of Land Use Eco-security in Fujian Province,X826
  19. Research on Social Security of Migrant Workers in Shanghai,D632.1
  20. The Study on Landless Peasants Protection of Interests in Urbanization Process in Southeast China,D422.6

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile