메뉴 건너뛰기




Volumn , Issue , 2009, Pages 64-72

Incorporation of security mechanisms into the tmo scheme for real time distributed computing

Author keywords

Access control; AS TMO; AS TMOSM; AS TNCM; Encryption; Real time; Role; Role extension; Secure communication; Security; TMO

Indexed keywords

AS-TMO; AS-TMOSM; AS-TNCM; REAL-TIME; ROLE; ROLE-EXTENSION; SECURE COMMUNICATIONS; SECURITY; TMO;

EID: 77958603610     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/STFSSD.2009.51     Document Type: Conference Paper
Times cited : (1)

References (16)
  • 2
    • 34249661611 scopus 로고    scopus 로고
    • A middleware model supporting time-triggered message-triggered objects for standard Linux systems
    • July
    • S. F. Jenks, K. Kim, et al., "A middleware model supporting time-triggered message-triggered objects for standard Linux systems," Real-Time Systems, 36 (1), pp. 75-99, July 2007.
    • (2007) Real-Time Systems , vol.36 , Issue.1 , pp. 75-99
    • Jenks, S.F.1    Kim, K.2
  • 3
    • 0031198431 scopus 로고    scopus 로고
    • Object structures for real-time systems and simulators
    • August
    • K. H. Kim, "Object structures for real-time systems and simulators", IEEE Computer, 30 (8), August 1997, pp. 62-70.
    • (1997) IEEE Computer , vol.30 , Issue.8 , pp. 62-62
    • Kim, K.H.1
  • 5
    • 0033729473 scopus 로고    scopus 로고
    • APIs for real-time distributed object programming
    • June
    • K. H. Kim, "APIs for Real-Time Distributed Object Programming," IEEE Computer, June 2000, pp.72-80.
    • (2000) IEEE Computer , pp. 72-72
    • Kim, K.H.1
  • 8
    • 38949196707 scopus 로고    scopus 로고
    • Systematic composition and analyzability of dependable networked embedded computing system
    • October
    • K.H. Kim, "Systematic composition and analyzability of dependable networked embedded computing system", Proc. 25th Symp. on Reliable Distributed Systems (SRDS 2006), October 2006, pp.339-340. (Position paper)
    • (2006) Proc. 25th Symp. on Reliable Distributed Systems (SRDS 2006) , pp. 339-340
    • Kim, K.H.1
  • 16
    • 33748564921 scopus 로고    scopus 로고
    • A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
    • December
    • C. Xenakis, N. Laoutaris, L. Merakos and Ioannis Stavrakakis, "A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms," Computer Networks, 50 (17), December 2006, pp. 3225-3241.
    • (2006) Computer Networks , vol.50 , Issue.17 , pp. 3225-3225
    • Xenakis, C.1    Laoutaris, N.2    Merakos, L.3    Stavrakakis, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.