Sciweavers

3516 search results - page 206 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
150
Voted
IEEEHPCS
2010
15 years 2 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
ICOST
2007
Springer
15 years 9 months ago
Characterizing Safety of Integrated Services in Home Network System
This paper formalizes three kinds of safety to be satisfied by networked appliances and services in the emerging home network system (HNS). The local safety is defined by safety ...
Ben Yan, Masahide Nakamura, Lydie du Bousquet, Ken...
IPPS
2006
IEEE
15 years 9 months ago
Realization of virtual networks in the DECOS integrated architecture
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
Roman Obermaisser, Philipp Peti
135
Voted
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 7 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
IPSN
2009
Springer
15 years 10 months ago
Recovering temporal integrity with Data Driven Time Synchronization
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...