Sciweavers

3516 search results - page 10 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
EMSOFT
2005
Springer
14 years 1 months ago
SHIM: a deterministic model for heterogeneous embedded systems
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
Stephen A. Edwards, Olivier Tardieu
WCRE
1999
IEEE
13 years 11 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
ATAL
2003
Springer
14 years 22 days ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 1 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
12 years 7 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...