메뉴 건너뛰기




Volumn , Issue , 2012, Pages 437-444

Modeling security aspects in distributed real-time component-based embedded systems

Author keywords

Component model; Embedded systems; Model Driven Development; Security

Indexed keywords

COMPONENT BASED; COMPONENT MODEL; COMPONENT-BASED SOFTWARE DEVELOPMENT; META MODEL; MODEL DRIVEN DEVELOPMENT; MODEL SECURITY; MODEL-DRIVEN ENGINEERING; RESOURCE CONSUMPTION; SECURITY; SECURITY IMPLEMENTATIONS; SECURITY REQUIREMENTS; SENSITIVE DATAS; TIMING ANALYSIS;

EID: 84863908276     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2012.103     Document Type: Conference Paper
Times cited : (9)

References (20)
  • 1
    • 37149040956 scopus 로고    scopus 로고
    • Model driven software development in the context of embedded component infrastructures
    • Component-Based Software Development for Embedded Systems, ser. C. Atkinson, C. Bunse, H.-G. Gross, and C. Peper, Eds., Springer Berlin / Heidelberg
    • M. Voelter, C. Salzmann, and M. Kircher, "Model driven software development in the context of embedded component infrastructures," in Component-Based Software Development for Embedded Systems, ser. Lecture Notes in Computer Science, C. Atkinson, C. Bunse, H.-G. Gross, and C. Peper, Eds., vol. 3778. Springer Berlin / Heidelberg, 2005, pp. 143-163.
    • (2005) Lecture Notes in Computer Science , vol.3778 , pp. 143-163
    • Voelter, M.1    Salzmann, C.2    Kircher, M.3
  • 2
    • 78650501943 scopus 로고    scopus 로고
    • Security engineering for embedded systems: The secfutur vision
    • Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, ser. New York, NY, USA: ACM
    • S. Gürgens, C. Rudolph, A. Maña, and S. Nadjm-Tehrani, "Security engineering for embedded systems: the secfutur vision," in Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, ser. S&D4RCES '10. New York, NY, USA: ACM, 2010, pp. 7:1-7:6.
    • (2010) S&D4RCES '10
    • Gürgens, S.1    Rudolph, C.2    Maña, A.3    Nadjm-Tehrani, S.4
  • 4
    • 0141725660 scopus 로고    scopus 로고
    • The pragmatics of model-driven development
    • September
    • B. Selic, "The pragmatics of model-driven development," IEEE Software, vol. 20, pp. 19-25, September 2003.
    • (2003) IEEE Software , vol.20 , pp. 19-25
    • Selic, B.1
  • 6
    • 84948959428 scopus 로고    scopus 로고
    • Accessed: May 2011
    • E. Albrechtsen, "Security vs safety," NTNU-Norwegian University of Science and Technology http://www.iot.ntnu.no/users/albrecht/, Accessed: May 2011.
    • Security vs Safety
    • Albrechtsen, E.1
  • 7
    • 4444331720 scopus 로고    scopus 로고
    • Security as a new dimension in embedded system design
    • Proceedings of the 41st annual Design Automation Conference, ser. New York, NY, USA: ACM, moderator-Ravi, Srivaths
    • P. Kocher, R. Lee, G. McGraw, and A. Raghunathan, "Security as a new dimension in embedded system design," in Proceedings of the 41st annual Design Automation Conference, ser. DAC '04. New York, NY, USA: ACM, 2004, pp. 753-760, moderator-Ravi, Srivaths.
    • (2004) DAC '04 , pp. 753-760
    • Kocher, P.1    Lee, R.2    McGraw, G.3    Raghunathan, A.4
  • 8
    • 77949955302 scopus 로고    scopus 로고
    • A data-entity approach for component-based real-time embedded systems development
    • Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation, ser. Piscataway, NJ, USA: IEEE Press
    • A. Hjertström, D. Nyström, and M. Sjödin, "A data-entity approach for component-based real-time embedded systems development," in Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation, ser. ETFA'09. Piscataway, NJ, USA: IEEE Press, 2009, pp. 170-177.
    • (2009) ETFA'09 , pp. 170-177
    • Hjertström, A.1    Nyström, D.2    Sjödin, M.3
  • 11
    • 56749182693 scopus 로고    scopus 로고
    • State of the art of QVT: A model transformation language standard
    • Applications of Graph Transformations with Industrial Relevance, ser. Springer Berlin
    • I. Kurtev, "State of the art of QVT: A model transformation language standard," in Applications of Graph Transformations with Industrial Relevance, ser. Lecture Notes in Computer Science. Springer Berlin, 2008, vol. 5088, pp. 377-393.
    • (2008) Lecture Notes in Computer Science , vol.5088 , pp. 377-393
    • Kurtev, I.1
  • 14
    • 79955143136 scopus 로고    scopus 로고
    • Secureuml: A uml-based modeling language for model-driven security
    • Proceedings of the 5th International Conference on The Unified Modeling Language, ser. London, UK: Springer- Verlag
    • T. Lodderstedt, D. A. Basin, and J. Doser, "Secureuml: A uml-based modeling language for model-driven security," in Proceedings of the 5th International Conference on The Unified Modeling Language, ser. UML '02. London, UK: Springer-Verlag, 2002, pp. 426-441.
    • (2002) UML '02 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 17
    • 77249107213 scopus 로고    scopus 로고
    • Security analysis of a biometric authentication system using umlsec and jml
    • Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, ser. Berlin, Heidelberg: Springer- Verlag
    • J. Lloyd and J. Jürjens, "Security analysis of a biometric authentication system using umlsec and jml," in Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, ser. MODELS '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 77-91.
    • (2009) MODELS '09 , pp. 77-91
    • Lloyd, J.1    Jürjens, J.2
  • 19
    • 67650248713 scopus 로고    scopus 로고
    • A security modeling approach for web-service-based business processes
    • Proceedings of the 2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, ser. Washington, DC, USA: IEEE Computer Society
    • M. Jensen and S. Feja, "A security modeling approach for web-service-based business processes," in Proceedings of the 2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, ser. ECBS '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 340-347.
    • (2009) ECBS '09 , pp. 340-347
    • Jensen, M.1    Feja, S.2
  • 20
    • 78049298573 scopus 로고    scopus 로고
    • The price of security in wireless sensor networks
    • December
    • J. Lee, K. Kapitanova, and S. H. Son, "The price of security in wireless sensor networks," Journal of Computer Networks, vol. 54, pp. 2967-2978, December 2010.
    • (2010) Journal of Computer Networks , vol.54 , pp. 2967-2978
    • Lee, J.1    Kapitanova, K.2    Son, S.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.