Paper
28 May 2013 Trusted computation through biologically inspired processes
Author Affiliations +
Abstract
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Gustave W. Anderson "Trusted computation through biologically inspired processes", Proc. SPIE 8751, Machine Intelligence and Bio-inspired Computation: Theory and Applications VII, 875109 (28 May 2013); https://doi.org/10.1117/12.2015394
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Cognitive modeling

Computer security

Network security

Information security

Control systems

Clouds

Computing systems

Back to Top