Javascript must be enabled to continue!
A New Secure Chip File Access Method Based on Security Level Information
View through CrossRef
This paper analyzes the shortcomings of two commonly used secure chip file access methods and proposes a new secure chip file access method based on security level information. The method sets the security level information in the key file; sets the access operation permission information in the application file; obtains the security level information, determines the security status information of the directory file corresponding to the key file according to the security level information; and obtains the access operation permission. The information determines the file access authority according to the access operation authority information and the security state information. This method effectively reduces the complexity of the security mechanism within the secure chip, increases the convenience of file access, and overall and comprehensively guarantees the security of file access.
Title: A New Secure Chip File Access Method Based on Security Level Information
Description:
This paper analyzes the shortcomings of two commonly used secure chip file access methods and proposes a new secure chip file access method based on security level information.
The method sets the security level information in the key file; sets the access operation permission information in the application file; obtains the security level information, determines the security status information of the directory file corresponding to the key file according to the security level information; and obtains the access operation permission.
The information determines the file access authority according to the access operation authority information and the security state information.
This method effectively reduces the complexity of the security mechanism within the secure chip, increases the convenience of file access, and overall and comprehensively guarantees the security of file access.
Related Results
Creating Secure File Systems in Open-Source Operating Systems
Creating Secure File Systems in Open-Source Operating Systems
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. B...
Comparative evaluation of the effect of glide path creation with Nitiflex hand K- file, Proglider and Path file on canal transportation and concentricity in apically curved canals - An In- Vitro study.
Comparative evaluation of the effect of glide path creation with Nitiflex hand K- file, Proglider and Path file on canal transportation and concentricity in apically curved canals - An In- Vitro study.
Abstract
Aim:
To compare and evaluate the effect of glide path creation with Nitiflex hand K- file, Proglider and Path file on canal transportation and concentricity in...
Abstract 4146122: Potential Protective Roles of Clonal Hematopoiesis of Indeterminate Potential in Angina Pectoris
Abstract 4146122: Potential Protective Roles of Clonal Hematopoiesis of Indeterminate Potential in Angina Pectoris
Introduction:
Clonal hematopoiesis of indeterminate potential (CHIP) poses strong relationship to the occurrence of cardiovascular diseases with the process of aging. I...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
File berbentuk suara banyak digunakan dalam kegiatan sehari-hari orang dalam mendukung aktifitasnya seperti penggunaan file suara dalam aplikasi pemutar musik baik secara daring m...
File system metadata virtualization
File system metadata virtualization
The advance of computing systems has brought new ways to use and access the stored data that push the architecture of traditional file systems to its limits, making them inadequate...
Perception of Endodontist /General dentists on Etiologies of file fracture associated with different types of rotary file systems. –A Questionnaire based cross sectional study
Perception of Endodontist /General dentists on Etiologies of file fracture associated with different types of rotary file systems. –A Questionnaire based cross sectional study
Background: File fractures are a common complication in endodontic procedures, leading to increased treatment time and potential treatment failure. Understanding the etiologies of ...

