Sciweavers

575 search results - page 76 / 115
» Formal Coverification of Embedded Systems Using Model Checki...
Sort
View
121
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 7 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
173
Voted
FASE
2008
Springer
15 years 3 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ECRTS
2003
IEEE
15 years 7 months ago
Hardware-Based Solution Detecting Illegal References in Real-Time Java
The memory model used in the Real-Time Specification for Java (RTSJ) imposes strict assignment rules to or from memory areas preventing the creation of dangling pointers, and thus...
M. Teresa Higuera-Toledano
MODELLIERUNG
2004
15 years 3 months ago
CASE Support and Model-Based Development
ion from the implementation they use. Some tools rather consequently use this abstract model; others at least partly keep the implementational view, modeling components, e.g., by o...
Bernhard Schätz, Jan Romberg, Oscar Slotosch,...
145
Voted
TDSC
2011
14 years 9 months ago
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems
Abstract— We present on-line tunable diagnostic and membership protocols for generic time-triggered (TT) systems to detect crashes, send/receive omission faults and network parti...
Marco Serafini, Péter Bokor, Neeraj Suri, J...