![]() ![]() ![]() Well, remember, Cell/B.E.'s security is part of its architecture! It's not IBM developerWorks: The Cell Broadband Engine processor security architecture Security Architect, IBM Systems and Technology Group ![]() The framework in which these features are provided." - Kanna Shimizu, Gives a brief overview of the Cell BE architecture so you can better see Generator, is also relevant to some security issues. A fourth feature, a hardware random number Unlocking of secrets such as various keys can be protected using the And finally, with the Hardware Root of Secrecy feature, Secure Boot is normally done only at power-on time, but theĬell BE processor can Secure Boot an application thread multiple timesĭuring runtime. Modification in the application is detected, the application execution canīe stopped. Secure Boot feature, an application can run a check on itself before it isĮxecuted to verify that it hasnot be modified and compromised. Isolated from the rest of the software environment. The hardware Secure Processing Vault feature, an application can execute "., the Cell BE security architecture offers three core features. Straight from the metal, to support not only games but also a lot of otherĪpplications (finance, transcoding. processor/architecture was built with security in mind, ProblemSolver 5372d ago (Edited 5372d ago ) ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |