2013年6月19日 星期三

Remote control for the embedded system

Industrial computer, gaming platform, Embedded pc



Identity and access management at the application are finally getting the attention that they deserve, but they are not new embedded computer concepts. With a growing importance on stronger authentication, cloud providers need to increase the number of authentication factors they consider. The typical two-factor authentication approach – typically a Common Access Card (CAC) in embedded computer – is not enough; they need to add additional factors based on the risk associated with certain data. We are focusing on ‘fine-grained entitlements’ in applications and how to secure everything with a lot of fidelity at the application level and data level. This also includes new approaches and technologies to securing data at rest.”


沒有留言:

張貼留言