메뉴 건너뛰기




Volumn , Issue , 2007, Pages 182-183

Developing secure embedded systems: Pitfalls and how to avoid them

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34548773908     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSECOMPANION.2007.30     Document Type: Conference Paper
Times cited : (9)

References (6)
  • 1
    • 34548787238 scopus 로고    scopus 로고
    • Model-based security engineering of distributed information systems using UMLsec
    • ACM
    • B. Best, J. Jürjens, and B. Nuseibeh. Model-based security engineering of distributed information systems using UMLsec. In ICSE. ACM, 2007.
    • (2007) ICSE
    • Best, B.1    Jürjens, J.2    Nuseibeh, B.3
  • 3
    • 33846318194 scopus 로고    scopus 로고
    • Code security analysis of a biometric authentication system using automated theorem provers
    • IEEE
    • J. Jürjens. Code security analysis of a biometric authentication system using automated theorem provers. In ACSAC'05. IEEE, 2005.
    • (2005) ACSAC'05
    • Jürjens, J.1
  • 4
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • IEEE
    • J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In ICSE. IEEE, 2005.
    • (2005) ICSE
    • Jürjens, J.1
  • 5
    • 34548740822 scopus 로고    scopus 로고
    • Security analysis of crypto-based Java programs using automated theorem provers
    • J. Jürjens. Security analysis of crypto-based Java programs using automated theorem provers. In ASE. IEEE, 2006.
    • (2006) ASE. IEEE
    • Jürjens, J.1
  • 6
    • 33749416173 scopus 로고    scopus 로고
    • UMLsec group
    • UMLsec group. Security analysis tool, 2004. http://www.umlsec.org.
    • (2004) Security analysis tool


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.