REGISTER | LOGIN
Breaking News
Comment
mclaus
User Rank
Author
Re: Part V: Case Study: Highlighting a Successful Design Example
mclaus   11/30/2012 12:33:19 PM
NO RATINGS
We ensure that any code that runs on our system is known.  The boot process gets the boot image from a known, encrypted, secure source.  Any process code that is run after boot must be registered with the boot image and it;'s image much match the one that was registered.



Like Us on Facebook