Translator Disclaimer
Paper
28 May 2013 Trusted computation through biologically inspired processes
Author Affiliations +
Abstract
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Gustave W. Anderson "Trusted computation through biologically inspired processes", Proc. SPIE 8751, Machine Intelligence and Bio-inspired Computation: Theory and Applications VII, 875109 (28 May 2013); https://doi.org/10.1117/12.2015394
PROCEEDINGS
7 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

ASN reputation system model
Proceedings of SPIE (May 14 2015)
ISA for the internet of tactical things
Proceedings of SPIE (May 04 2017)
A case of reliable remote functionality
Proceedings of SPIE (July 15 2008)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)

Back to Top