SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : WAVX Anyone?

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: 24601 who wrote (11204)7/26/2001 2:57:13 PM
From: Marty Lee  Read Replies (2) of 11417
 
We have what they want,

*MOVING FORWARD TOWARD EMBEDDED SECURITY
By Sean Corcoran
While privacy concerns have dealt significant setbacks to some
embedded-security systems in the past few years, portions of the security
industry haven't given up on having infosec features built directly into
devices.

At a symposium sponsored by the Consortium for Efficient Embedded Security
(CEES) in Boston earlier this month, security architects, application
developers and users defined the need for standardized interoperable
security solutions as wireless devices and services continue to expand

"There is an immediate and growing need for standardization efforts to
address basic questions around system architectures, security ownership
and trusted models, and CEES is working hard to make secure systems
leveraging efficient embedded security a reality," says Daniel Lieman,
chairman of CEES.

Industry experts say the ideal embedded system will be transparent.
Security chips or pieces of software will be built into a device, and the
encryption and decryption of files, folders and messages will be done
automatically. If done correctly, experts say hackers won't be able to
assume a user's identity simply by swiping your user name and cracking
your password. They would have to steal the device, too.

Embedded security isn't new, however, and some features have already hit
the market. Last year, for example, IBM began selling some of its PCs with
a security chip embedded in the motherboard that protects electronic
communications by securing a user's private key.

But experts say a worrisome lack of strong and efficient industry
standards could ultimately jeopardize the large-scale deployment of
embedded-security devices. "In one sense it's a race, with a lot of
companies trying to get something out there to capture a market share, but
there really isn't a set of good standards," says Lieman director of
evangelism and standards at Ntru.

At the symposium, more than 35 companies--from Adobe to Zucotto
Wireless--discussed the best way to standardize trust models and system
architectures.

"As part of the CEES symposium, we examined the challenges of embedded
security and the development of trust associated with the process to
better shape our understanding of device ownership," says Burt Kaliski,
chief scientist at RSA Laboratories, the research center of RSA Security
Inc.

CEES, whose charter members include Intel, MasterCard International and
Sony, has set a goal of early next year for producing a series of
efficient embedded-security standards that complement existing security
and cryptography standards, says Lieman.

Once standards are established, the trick is going to be getting companies
to implement them as they design their embedded-security systems. To
accomplish this, Lieman is working to get companies on board now, before
the market becomes even more fragmented.

"The best way is to make sure all the people you want to promote the
standards--all these people who need to implement something--are involved
in making these standards. So, in the end, it all works together and it is
a secure system," says Lieman.

Marty
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext