{"id":457499,"date":"2024-10-20T09:51:36","date_gmt":"2024-10-20T09:51:36","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-58912024\/"},"modified":"2024-10-26T18:19:18","modified_gmt":"2024-10-26T18:19:18","slug":"bsi-pd-iso-iec-tr-58912024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-58912024\/","title":{"rendered":"BSI PD ISO\/IEC TR 5891:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Abbreviated terms 5 Relationship to existing standards 5.1 Standards of security assessment <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.2 Relationship to ISO\/IEC 15408-3 5.3 Relationship to ISO\/IEC TS 30104 6 Background 6.1 Complexity and security 6.2 Challenges in defining hardware security assessment techniques <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 7 Hardware monitoring technologies 7.1 Overview 7.2 Research in academic areas <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 7.3 Industrial cases <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7.4 Purpose 7.4.1 Security <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.4.2 Debugging <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.4.3 Tuning performance 7.4.4 Fault tolerance and QoS <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.4.5 Physical specification measurement <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.4.6 Application-specific monitoring 7.5 Carrier type 7.5.1 Middleware <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.5.2 Software <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.5.3 Hardware-assisted monitors <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.5.4 Software vs. hardware-assisted solutions 7.6 Target entity 7.6.1 IP cores <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.6.2 Processing units 7.6.3 Memory <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.6.4 Peripheral devices 7.7 Objective patterns 7.7.1 Information content 7.7.2 Physical specification 7.7.3 Behaviours <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.8 Deployment method 7.8.1 General 7.8.2 Intrusiveness 7.8.3 Offline or online 7.8.4 Synchronous or asynchronous 7.8.5 Single or multiple monitors 7.8.6 Scalability <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.8.7 Resilience and redundancy 7.8.8 Compatibility 7.8.9 Impact on performance 7.8.10 Lawful and ethical data handling regulations and requirements 8 Utilizing monitoring technologies for hardware security assessment 8.1 Existing state-of-the-art security assessment approaches <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8.2 How hardware monitoring can help <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.3 Challenges <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9 \u200bCertification for monitoring hardware <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection\u00a0\u2014 Hardware monitoring technology for hardware security assessment<\/b><\/p>\n |