Sciweavers

29 search results - page 6 / 6
» Static Analysis to Enforce Safe Value Flow in Embedded Contr...
Sort
View
FASE
2008
Springer
13 years 7 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
13 years 11 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
JSA
2000
175views more  JSA 2000»
13 years 5 months ago
Complete worst-case execution time analysis of straight-line hard real-time programs
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
Friedhelm Stappert, Peter Altenbernd
SIGMETRICS
2004
ACM
124views Hardware» more  SIGMETRICS 2004»
13 years 10 months ago
Interposed proportional sharing for a storage service utility
This paper develops and evaluates new share-based scheduling algorithms for differentiated service quality in network services, such as network storage servers. This form of resou...
Wei Jin, Jeffrey S. Chase, Jasleen Kaur