Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Geoffrey S. Strongin is active.

Publication


Featured researches published by Geoffrey S. Strongin.


Information Security Technical Report | 2005

Trusted computing using AMD Pacifica and Presidio secure virtual machine technology

Geoffrey S. Strongin

The success of the computer industry over the last 20 years is also the source of the greatest challenge to the industry. The combination of wide, near-ubiquitous deployment of platforms based on the x86 architecture, operating systems that allow users to both develop and execute arbitrary software, and finally the interconnection of large numbers of such systems via the Internet, has led toa ‘‘Perfect Storm’’ofcomputer securityproblems. The consequences of computer security failures are increasingly severe. Most governments and businesses now rely upon computers for day-to-day tasks as well as for mission-critical applications. Individuals regularly depend on personal computers for access to information, entertainment, and personal financialmanagement. Computers also control elements of critical infrastructure where the consequences of failure extend into the physical world. The dynamics of the free market have led to a range of commercial responses to evolving computer security problems. Software tools targeted at addressing individual threats emerged and have met substantial market success. Followon products that address more threats are now in wide distribution. Operating system vendors have also made significant investments in training, tools


scalable trusted computing | 2006

The role of trusted computing in internet scale DRM

Geoffrey S. Strongin

The XRI Data Interchange (XDI) protocols and schemas provide a foundation for internet scale exchange of data between parties based on mutually agreed upon policies. Local enforcement of the policy and the preservation of the persistent binding between the data and policy imply a local policy enforcement system. This talk explores the relationship between trusted computing, remote attestation and local policy enforcement capabilities in an Internet scale environment.


Archive | 2001

Method and apparatus for securing portions of memory

Geoffrey S. Strongin; Brian C. Barnes; Rodney Schmidt


Archive | 2000

Circuit and method for maintaining order of memory access requests initiated by devices in a multiprocessor system

James B. Keller; Dale E. Gulick; Larry D. Hewitt; Geoffrey S. Strongin


Archive | 2003

Method for selectively disabling interrupts on a secure execution mode-capable processor

David S. Christie; Geoffrey S. Strongin; Kevin J. McGrath


Archive | 2007

DMA Address Translation in an IOMMU

Mark D. Hummel; Geoffrey S. Strongin; Mitchell Alsup; Michael J. Haertel; Andrew W. Lueck


Archive | 1995

Method and apparatus for improved video decompression by selection of IDCT method based on image characteristics

Geoffrey S. Strongin; Yi Liu; Michael R. Tucker


Archive | 1997

Method and apparatus for hybrid VLC bitstream decoding

Yi Liu; Michael R. Tucker; Geoffrey S. Strongin


Archive | 2003

Initialization of a computer system including a secure execution mode-capable processor

Kevin J. McGrath; Geoffrey S. Strongin; David S. Christie; William A. Hughes; Dale E. Gulick


Archive | 2010

Using an IOMMU to create memory archetypes

Mark D. Hummel; Geoffrey S. Strongin; Andrew W. Lueck

Collaboration


Dive into the Geoffrey S. Strongin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi Liu

Advanced Micro Devices

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge