메뉴 건너뛰기




Volumn , Issue , 2011, Pages 116-121

Impact of adding security to safety-critical real-time systems: A case study

Author keywords

AADL; Embedded Systems; Modelling; Performance; Safety; Security; Software Components

Indexed keywords

AADL; MODELLING; PERFORMANCE; SECURITY; SOFTWARE COMPONENTS;

EID: 80054977480     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSACW.2011.29     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 3
    • 34250158136 scopus 로고    scopus 로고
    • Integrating security modeling into embedded system design
    • DOI 10.1109/ECBS.2007.45, 4148937, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems
    • M. Eby, J. Werner, G. Karsai, A. Ledeczi, "Integrating Security Modeling in Embedded System Design", Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, IEEE, 2007, pp 221-228 (Pubitemid 46900676)
    • (2007) Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems , pp. 221-228
    • Eby, M.1    Werner, J.2    Karsai, G.3    Ledeczi, A.4
  • 4
    • 34548836760 scopus 로고    scopus 로고
    • The architecture analysis and design language (AADL): An introduction
    • Software Engineering Institute
    • P. Feiler, D. Gluch, "The Architecture Analysis and Design Language (AADL): An Introduction", Technical Note CMU/SEI-2006-TN-011, 2006, Software Engineering Institute.
    • (2006) Technical Note CMU/SEI-2006-TN-011
    • Feiler, P.1    Gluch, D.2
  • 5
    • 50849110201 scopus 로고    scopus 로고
    • Building secure systems using model-based engineering and architectural models
    • September
    • J.F. Hansson, P. Feiler, J. Morley, "Building Secure Systems Using Model-Based Engineering and Architectural Models", Crosstalk, September 2008, pp 10-15
    • (2008) Crosstalk , pp. 10-15
    • Hansson, J.F.1    Feiler, P.2    Morley, J.3
  • 6
    • 0036143326 scopus 로고    scopus 로고
    • Composing security-aware software
    • DOI 10.1109/52.976939
    • K.M. Khan, J. Han, "Composing Security-Aware Software", IEEE Software, January 2002, pp 34-41 (Pubitemid 34078171)
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 34-41
    • Khan, K.M.1    Han, J.2
  • 8
    • 80055020497 scopus 로고    scopus 로고
    • Michigan State University, October 11, 2006, Retrieved March 3, 2010
    • Michigan State University, October 11, 2006, Retrieved March 3, 2010, http://www.cse.msu.edu/~chengb/RE-491/Projects/cacc-msu-ford.pdf
  • 12
    • 84992029563 scopus 로고    scopus 로고
    • Original October 28, 2002, Modified May 18, 2009, Retrieved April 7, 2010
    • G. Darby, "Discrete Event Simulator", Delphi, Original October 28, 2002, Modified May 18, 2009, Retrieved April 7, 2010, http://www. delphiforfun.org/Programs/discrete-sim.htm
    • Discrete Event Simulator
    • Darby, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.