Sciweavers

262 search results - page 13 / 53
» Providing Trusted Components to the Industry
Sort
View
SPLC
2008
14 years 11 months ago
Using Aspects and Component Concepts to Improve Reuse of Software for Embedded Systems Product Lines
Embedded systems have several characteristics, such as application specific needs, real-time constraints and intrinsic embedded concerns (i.e. energy consumption), which hinder th...
Edison Pignaton de Freitas, Marco A. Wehrmeister, ...
CBSQ
2003
Springer
15 years 2 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
ISORC
2005
IEEE
15 years 3 months ago
Model-Checking of Component-Based Event-Driven Real-Time Embedded Software
As complexity of real-time embedded software grows, it is desirable to use formal verification techniques to achieve a high level of assurance. We discuss application of model-ch...
Zonghua Gu, Kang G. Shin
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
74
Voted
IFIP
2010
Springer
14 years 4 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...