Sciweavers

3516 search results - page 167 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
CODES
2008
IEEE
15 years 10 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
148
Voted
CASSIS
2005
Springer
15 years 9 months ago
The Design of Application-Tailorable Operating System Product Lines
System software for deeply embedded devices has to cope with a broad variety of requirements and platforms, but especially with strict resource constraints. To compete against prop...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 8 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
APSEC
2006
IEEE
15 years 9 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
CASES
2010
ACM
15 years 24 days ago
Hardware trust implications of 3-D integration
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductiv...
Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cy...