Sciweavers

107 search results - page 3 / 22
» A Reputation-Based Approach for Securing Vivaldi Embedding S...
Sort
View
EMSOFT
2004
Springer
13 years 10 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
ASPDAC
2007
ACM
103views Hardware» more  ASPDAC 2007»
13 years 9 months ago
Towards scalable and secure execution platform for embedded systems
Hiroaki Inoue, Masato Edahiro, Junji Sakai
DKE
2002
130views more  DKE 2002»
13 years 5 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
RTCSA
2006
IEEE
13 years 11 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
CODES
2007
IEEE
13 years 11 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...