By Topic

Security pipeline interface (SPI)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Hoffman, L. ; Dept. of Electr. Eng. & Comput. Sci., George Washington Univ., Washington, DC, USA ; Davis, R.J.

Proposes a new approach, security pipeline interface, for adding security to existing systems. Security functions are added in series to existing I/O paths without modification to the host system internals. The result is an I/O pipeline of security functions which is adaptable to both trusted and untrusted environments. Security of the physically separated SPI architecture is easier to analyze then other security products. Additionally, SPI requires no modification to the operating system. However, SPI is limited to the host processor interfaces. The SPI approach is compared with and contrasted to other ongoing security pipeline research. Examples of applications are presented which illustrate how security functions are added in a pipeline. These include a rogue program controller and intrusion detection systems

Published in:

Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual

Date of Conference:

3-7 Dec 1990