메뉴 건너뛰기




Volumn 21, Issue 1, 2010, Pages 154-160

Confidentiality-aware message scheduling for security-critical wireless networks

Author keywords

Confidentialityaware; Message scheduling; Real time; Security critical; Wireless networks

Indexed keywords

APERIODIC MESSAGES; CONFIDENTIALITYAWARE; MESSAGE SCHEDULING; PROFIT MODEL; REAL-TIME; RISK-BASED SECURITY; SECURITY-CRITICAL;

EID: 77956276502     PISSN: 10044132     EISSN: None     Source Type: Journal    
DOI: 10.3969/j.issn.1004-4132.2010.01.025     Document Type: Article
Times cited : (5)

References (17)
  • 2
    • 17944364573 scopus 로고    scopus 로고
    • Safety critical real-time networks based on Ethernet technology
    • S. P. Yang, N. Sang, G. Z. Xiong. Safety critical real-time networks based on Ethernet technology. Journal of Software, 2005, 16(1): 121-134.
    • (2005) Journal of Software , vol.16 , Issue.1 , pp. 121-134
    • Yang, S.P.1    Sang, N.2    Xiong, G.Z.3
  • 3
    • 60449117536 scopus 로고    scopus 로고
    • Achieving long-term surveillance in vigilnet
    • P. Vicaire, T. He, T. Yan. Achieving long-term surveillance in vigilnet. ACM Trans. on Sensor Networks, 2009, 5(1): 1-39.
    • (2009) ACM Trans. on Sensor Networks , vol.5 , Issue.1 , pp. 1-39
    • Vicaire, P.1    He, T.2    Yan, T.3
  • 4
    • 46749127352 scopus 로고    scopus 로고
    • Minimum energy transmission scheduling subject to deadline constraints
    • A. Tarello, J. Sun, M. Zafer, et al. Minimum energy transmission scheduling subject to deadline constraints. ACM Wireless Networks, 2008, 14(5): 633-645.
    • (2008) ACM Wireless Networks , vol.14 , Issue.5 , pp. 633-645
    • Tarello, A.1    Sun, J.2    Zafer, M.3
  • 5
    • 34547987105 scopus 로고    scopus 로고
    • Energy-efficient wireless packet scheduling with quality of service control
    • X. Zhang, C. Z. Xu. Energy-efficient wireless packet scheduling with quality of service control. IEEE Trans. on Mobile Computing, 2007, 6(10): 1158-1170.
    • (2007) IEEE Trans. on Mobile Computing , vol.6 , Issue.10 , pp. 1158-1170
    • Zhang, X.1    Xu, C.Z.2
  • 6
    • 33644994675 scopus 로고    scopus 로고
    • Energy efficient transmission scheduling for delay constrained wireless networks
    • P. Nuggehalli, V. Srinivasan, R. Rao. Energy efficient transmission scheduling for delay constrained wireless networks. IEEE Trans. on Wireless Communications, 2006, 5(2): 531-539.
    • (2006) IEEE Trans. on Wireless Communications , vol.5 , Issue.2 , pp. 531-539
    • Nuggehalli, P.1    Srinivasan, V.2    Rao, R.3
  • 9
    • 34548359370 scopus 로고    scopus 로고
    • Energy efficient scheduling with individual packet delay constraints: Offline and online results
    • W. Chen, M. J. Neely, Mitra. U. Energy efficient scheduling with individual packet delay constraints: offline and online results. Proc. of IEEE INFOCOM, 2007: 1136-1144.
    • (2007) Proc. of IEEE INFOCOM , pp. 1136-1144
    • Chen, W.1    Neely, M.J.2    Mitra., U.3
  • 12
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • K. Ren, W. Lou, Y. Zhang. LEDS: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. on Mobile Computing, 2008, 7(5): 585-598.
    • (2008) IEEE Trans. on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 13
    • 52349121324 scopus 로고    scopus 로고
    • Improving security of real-time wireless networks through packet scheduling
    • X. Qin, M. Alghamdi, M. Nijim, et al. Improving security of real-time wireless networks through packet scheduling. IEEE Trans. on Wireless Communications, 2008, 7(9): 3273-3279.
    • (2008) IEEE Trans. on Wireless Communications , vol.7 , Issue.9 , pp. 3273-3279
    • Qin, X.1    Alghamdi, M.2    Nijim, M.3
  • 14
    • 33846667508 scopus 로고    scopus 로고
    • Modeling and improving security of a local disk system for write-intensive workloads
    • M. Nijim, X. Qin, T. Xie. Modeling and improving security of a local disk system for write-intensive workloads. ACM Trans. on Storage, 2006, 2(4): 400-423.
    • (2006) ACM Trans. on Storage , vol.2 , Issue.4 , pp. 400-423
    • Nijim, M.1    Qin, X.2    Xie, T.3
  • 15
    • 33646486528 scopus 로고    scopus 로고
    • Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling
    • S. Song, K. Hwang, Y. Kwok. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans. on Computers, 2006, 55(6): 703-719.
    • (2006) IEEE Trans. on Computers , vol.55 , Issue.6 , pp. 703-719
    • Song, S.1    Hwang, K.2    Kwok, Y.3
  • 16
    • 17844381878 scopus 로고    scopus 로고
    • ISRAM information security risk analysis method
    • B. Karabacak, I. Sogukpinar. ISRAM: information security risk analysis method. Computers & Security, 2005, 24(2): 147-159.
    • (2005) Computers & Security , vol.24 , Issue.2 , pp. 147-159
    • Karabacak, B.1    Sogukpinar, I.2
  • 17
    • 43949147252 scopus 로고    scopus 로고
    • System-wide energy minimization for real time tasks: Lower bound and approximation
    • X. Zhong, C. Z. Xu. System-wide energy minimization for real time tasks: lower bound and approximation. ACM Trans. On Embedded Computing Systems, 2008, 7(3): 1-24.
    • (2008) ACM Trans. on Embedded Computing Systems , vol.7 , Issue.3 , pp. 1-24
    • Zhong, X.1    Xu, C.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.