Creating some very secure embedded systems
Creating a minimal Trusted Computing Base
Creating a proven Trusted Computing Base
Trust in Hardware
Isolation and I/O virtualization
Certification, transposition
Creating some very secure embedded systems
Creating a minimal Trusted Computing Base
Creating a proven Trusted Computing Base
Trust in Hardware
Isolation and I/O virtualization
Certification, transposition