Download now Free registration required
This paper presents several use-cases where embedded security is a fundamental requirement. For each use-case, one list a set of security-related characteristics and translate these characteristics into security requirements. The paper continues by analyzing the security requirements and identifying the embedded security building blocks of each one. The information for each use-case is presented in a tabular format combined with detailed analysis, facilitating easy reference per specific use-case.
- Format: PDF
- Size: 474.4 KB