Sciweavers

489 search results - page 20 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
FPL
2008
Springer
105views Hardware» more  FPL 2008»
15 years 1 months ago
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confidentiality and authenticity of FPGA bitstreams. In DPR syst...
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji T...
97
Voted
ISORC
2005
IEEE
15 years 6 months ago
On Recent Advances in Time/Utility Function Real-Time Scheduling and Resource Management
We argue that the key underpinning of the current state-of-the real-time practice — the priority artifact — and that of the current state-of-the real-time art — deadline-bas...
Binoy Ravindran, E. Douglas Jensen, Peng Li
204
Voted
POPL
2008
ACM
16 years 22 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
80
Voted
EUROMICRO
2000
IEEE
15 years 4 months ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
CLEIEJ
2010
14 years 9 months ago
Teaching Programming Principles through a Game Engine
Teaching fundamental programming to freshmen is a hard task to be performed, given the high level action and logical reasoning that are required for these students to develop in a...
Cristiane Camilo Hernandez, Luciano Silva, Rafael ...