Sciweavers

202 search results - page 27 / 41
» Composing and decomposing systems under security properties
Sort
View
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 1 months ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
JAIR
2011
214views more  JAIR 2011»
12 years 11 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
LICS
2010
IEEE
13 years 7 months ago
Polarity and the Logic of Delimited Continuations
Abstract—Polarized logic is the logic of values and continuations, and their interaction through continuation-passing style. The main limitations of this logic are the limitation...
Noam Zeilberger
ACSW
2003
13 years 10 months ago
Digital Rights Management for Content Distribution
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual p...
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sh...
CCS
2009
ACM
14 years 3 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...