메뉴 건너뛰기




Volumn 79, Issue 5, 2013, Pages 518-529

Security-aware optimization for ubiquitous computing systems with SEAT graph approach

Author keywords

Cryptographic algorithm; Real time; Schedule; Security; Ubiquitous system

Indexed keywords

CRYPTOGRAPHY; ENERGY UTILIZATION; GRAPH ALGORITHMS; GREEN COMPUTING; INTEGER PROGRAMMING; REAL TIME SYSTEMS; SCHEDULING; TREES (MATHEMATICS); UBIQUITOUS COMPUTING;

EID: 84875212881     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2012.11.002     Document Type: Article
Times cited : (98)

References (22)
  • 1
    • 0034313810 scopus 로고    scopus 로고
    • Integrating security and real-time requirements using covert channel capacity
    • S. Son, R. Mukkamala, and R. David Integrating security and real-time requirements using covert channel capacity IEEE Trans. Knowl. Data Eng. 12 2000 865 879
    • (2000) IEEE Trans. Knowl. Data Eng. , vol.12 , pp. 865-879
    • Son, S.1    Mukkamala, R.2    David, R.3
  • 3
    • 36348941936 scopus 로고    scopus 로고
    • Improving security for periodic tasks in embedded systems through scheduling
    • Article 20
    • T. Xie, and X. Qin Improving security for periodic tasks in embedded systems through scheduling ACM Trans. Embed. Comput. Syst. 6 3 2007 1 19 Article 20
    • (2007) ACM Trans. Embed. Comput. Syst. , vol.6 , Issue.3 , pp. 1-19
    • Xie, T.1    Qin, X.2
  • 5
    • 33645215766 scopus 로고    scopus 로고
    • Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    • Z. Shao, C. Xue, Q. Zhuge, M. Qiu, B. Xiao, and E.H.-M. Sha Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software IEEE Trans. Comput. 55 4 2006 443 453
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.4 , pp. 443-453
    • Shao, Z.1    Xue, C.2    Zhuge, Q.3    Qiu, M.4    Xiao, B.5    Sha, E.H.-M.6
  • 6
    • 3042590891 scopus 로고    scopus 로고
    • Security protection and checking in embedded system integration against buffer overflow attacks
    • Z. Shao, C. Xue, Q. Zhuge, E. Sha, B. Xiao, Security protection and checking in embedded system integration against buffer overflow attacks, in: IEEE ITCC, 2004, pp. 409-412.
    • (2004) IEEE ITCC , pp. 409-412
    • Shao, Z.1    Xue, C.2    Zhuge, Q.3    Sha, E.4    Xiao, B.5
  • 7
    • 85014332650 scopus 로고    scopus 로고
    • Security in embedded systems: Design challenges
    • P. Kocher Security in embedded systems: Design challenges ACM Trans. Embed. Comput. Syst. 3 3 2004 461 491
    • (2004) ACM Trans. Embed. Comput. Syst. , vol.3 , Issue.3 , pp. 461-491
    • Kocher, P.1
  • 9
    • 65849231067 scopus 로고    scopus 로고
    • Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
    • Article 25
    • M. Qiu, and E.H.-M. Sha Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems ACM Transact. Des. Automat. Electron. Syst. (TODAES) 14 2 March 2009 1 30 Article 25
    • (2009) ACM Transact. Des. Automat. Electron. Syst. (TODAES) , vol.14 , Issue.2 , pp. 1-30
    • Qiu, M.1    Sha, E.H.-M.2
  • 12
    • 33744802251 scopus 로고    scopus 로고
    • Scheduling security-critical real-time application on clusters
    • T. Xie, and X. Qin Scheduling security-critical real-time application on clusters IEEE Trans. Comput. 55 7 2006 864 879
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.7 , pp. 864-879
    • Xie, T.1    Qin, X.2
  • 14
    • 50149084761 scopus 로고    scopus 로고
    • A new allocation scheme for parallel applications with deadline and security constraints on cluster
    • T. Xie, X. Qin, A new allocation scheme for parallel applications with deadline and security constraints on cluster, in: Proc. of the 7th IEEE International Conference on Cluster Computing, 2005, pp. 1-10.
    • (2005) Proc. of the 7th IEEE International Conference on Cluster Computing , pp. 1-10
    • Xie, T.1    Qin, X.2
  • 17
    • 0021458524 scopus 로고
    • Dynamic task scheduling in distributed hard real-time system
    • K. Ramamritham, and J. Stankovic Dynamic task scheduling in distributed hard real-time system IEEE Trans. Softw. 1 3 1984 65 75
    • (1984) IEEE Trans. Softw. , vol.1 , Issue.3 , pp. 65-75
    • Ramamritham, K.1    Stankovic, J.2
  • 18
    • 84947902207 scopus 로고    scopus 로고
    • Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
    • B. Schneier, D. Whiting, Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor, in: International Workshop Proceedings on Fast Software Encryption, 1997, pp. 242-259.
    • (1997) International Workshop Proceedings on Fast Software Encryption , pp. 242-259
    • Schneier, B.1    Whiting, D.2
  • 22
    • 84875211657 scopus 로고    scopus 로고
    • Lingo
    • Lingo http://www.lindo.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.