next up previous
Next: Architecture Up: Introduction Previous: Threat Model

Security Policy

The security policy largely depends on the device usage but on generally a privilege run-level and an user run-level are essential. The security in privilege level can be classified as restricted (eg. Payroll data) or confidential [Res01], which requires encryption algorithms.



Vaibhav Bhandari 2001-11-29