Abstract

The early experimental work suggested the utility of a a secure coprocessor platform as a generic product that enables development and deployment of TCP applications. This chapter discusses the design challenges and tradeoffs we faced, in the mid-1990s, when trying to transform this notion into a real product. Section 5.1 sets the context for this project. Section 5.2 discusses the design obstacles we faced. Section 5.3 boils down this analysis into a set of requirements for a product. Section 5.4 sketches the technology we developed to help overcome these obstacles, and some usage scenarios this technology might enable.

Keywords

Migration Shipping Explosive Expense Arena 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Further Reading

  1. [SPW98]
    S.W. Smith, E. Palmer, and S. Weingart. Using a High-Performance, Pro-grammable Secure Coprocessor. In Financial Cryptography, Second International Conference, FC’98, pages 73–89. Springer-Verlag LNCS 1465, 1998.Google Scholar
  2. [SW99]
    S.W. Smith and S. Weingart. Building a High-Performance, Programmable Secure Coprocessor. Computer Networks, 31: 831–860, April 1999.CrossRefGoogle Scholar
  3. [DPSL99]
    J. Dyer, R. Perez, S.W. Smith, and M. Lindemann. Application Support Architecture for a High-Performance, Programmable Secure Coprocessor. In 22nd National Information Systems Security Conference, October 1999.Google Scholar
  4. [DLP+01]
    J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L.van Doom, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 34:57–66, 2001.Google Scholar

Copyright information

© Springer Science+Business Media New York 2005

Authors and Affiliations

  • Sean W. Smith
    • 1
  1. 1.Department of Computer ScienceDartmouth CollegeHanoverUSA

Personalised recommendations