Ronald F. Buskey
Motorola
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ronald F. Buskey.
international conference on parallel processing | 2006
Ronald F. Buskey; Barbara B. Frosik
In this paper, we consider a particular aspect of an effort to define trusted computing solutions. One of the hardware features of an embedded device is the JTAG (joint test action group) port that allows easy access to a processor for debugging purposes. This access is a potential security threat in a high assurance environment. This paper presents a solution of a protected JTAG. The purpose of providing protected JTAG, as part of the trusted computing platform, is to prevent access to private and confidential information by unauthorized users and yet allow debugging functions. The presented solution introduces different levels of access. The level of users access is based on the users permissions
Archive | 2006
Ronald F. Buskey; Barbara B. Frosik
Archive | 2003
Kevin C. Mowry; Ronald F. Buskey
Archive | 2005
Ronald F. Buskey; Larry C. Puhl; Duane C Rabe
Archive | 2006
Dean H. Vogler; Ronald F. Buskey
Archive | 2006
Ronald F. Buskey; Barbara B. Frosik; Douglas A. Kuhlman
Archive | 2006
Barbara B. Frosik; Ronald F. Buskey; Douglas A. Kuhlman
Archive | 2004
Joel D. Voss; Ronald F. Buskey; Joseph M. Hansen; David H. Hartley; Michael J. Terrington
Archive | 2007
Kevin J. Bush; John R. Barr; Charles P. Binzel; Ronald F. Buskey; Brian D. Storm
Archive | 2007
Kent D. Moat; Ronald F. Buskey; Brian G. Lucas