Next: Architecture
Up: Introduction
Previous: Threat Model
The security policy largely depends on the device usage but on generally a privilege run-level and an user run-level are essential. The security in privilege level can be classified as restricted (eg. Payroll data) or confidential [Res01], which requires encryption algorithms.
Vaibhav Bhandari
2001-11-29