Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

CASE 4. IBM: THE EMBEDDED SECURITY SUBSYSTEM > CASE STUDY QUESTIONS - Pg. 108

108 Case 4 IBM 7. Lemon, S., "Lenovo Completes Acquisition of IBM's PC Unit," Computerworld, May 2, 2005. Available: http://www.computer- world.com/news/2005/story/0,11280,101490,00.html. 8. "IBM Research--Global Security Analysis Lab." Available: http://www.research.ibm.com/gsal. 9. Personal communication with David Safford, Ph.D., Manager, Global Security Analysis Lab, IBM Watson Research Center, March 21, 2005. 10. National Institute of Standards and Technology and National Secu- rity Agency, "Common Criteria Evaluation and Validation Scheme Validation Report, IBM Cryptographic Security Chip for PC Clients Manufactured by ATMEL, Report Number CCEVS-VR-01-0005, October 10, 2001."Available: http://www.commoncriteriaportal.org/ public/files/epfiles/CCEVS-VID300-VR-01-0005.pdf. 11. Safford, D., "The Need for TCPA," October 2002. Available: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf.