메뉴 건너뛰기




Volumn 377 CCIS, Issue , 2013, Pages 90-97

Exploiting Functional Models to Assess the Security Aspect in Embedded System Design

Author keywords

Embedded System; Formalization; Real Time; Security Protocols; Validation

Indexed keywords

DATA FLOW ANALYSIS; EMBEDDED SOFTWARE; NETWORK SECURITY;

EID: 84904599156     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-40576-1_10     Document Type: Conference Paper
Times cited : (1)

References (15)
  • 2
    • 0026220148 scopus 로고
    • The Synchronous Approach to Reactive and Real-Time Systems
    • Benveniste, A., Berry, G.: The Synchronous Approach to Reactive and Real-Time Systems. Proceedings of the IEEE 79, 1270-1282 (1991).
    • (1991) Proceedings of the IEEE , vol.79 , pp. 1270-1282
    • Benveniste, A.1    Berry, G.2
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. E.: A lattice model of secure information flow. Communications of the ACM 19(5), 236-243 (1976).
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 67649432444 scopus 로고    scopus 로고
    • Adding branching to the strand space model
    • Fröschle, S.: Adding branching to the strand space model. Electron. Notes Theor. Comput. Sci. 242(1), 139-159 (2009).
    • (2009) Electron. Notes Theor. Comput. Sci , vol.242 , Issue.1 , pp. 139-159
    • Fröschle, S.1
  • 9
    • 79952605484 scopus 로고    scopus 로고
    • Reasoning with Past to Prove PKCS#11 Keys Secure
    • In: Degano, P., Etalle, S., Guttman, J. (eds.), LNCS,. Springer, Heidelberg
    • Fröschle, S., Sommer, N.: Reasoning with Past to Prove PKCS#11 Keys Secure. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 96-110. Springer, Heidelberg (2011).
    • (2011) FAST 2010 , vol.6561 , pp. 96-110
    • Fröschle, S.1    Sommer, N.2
  • 11
    • 84904621105 scopus 로고    scopus 로고
    • Analysing Security Protocols Using CSP
    • In:, Kremer (eds.) [4]
    • Lowe, G.: Analysing Security Protocols Using CSP. In: Cortier, Kremer (eds.) [4] (2011).
    • (2011) Cortier
    • Lowe, G.1
  • 12
    • 84883010807 scopus 로고    scopus 로고
    • Evaluating the Impact of Integrating a Security Module on the Real-Time Properties of a System
    • In: Schirner, G., Götz, M., Rettberg, A., Zanella, M.C., Rammig, F.J. (eds.), IFIP AICT,. Springer, Heidelberg
    • Malipatlolla, S., Stierand, I.: Evaluating the Impact of Integrating a Security Module on the Real-Time Properties of a System. In: Schirner, G., Götz, M., Rettberg, A., Zanella, M. C., Rammig, F. J. (eds.) IESS 2013. IFIP AICT, vol. 403, pp. 343-352. Springer, Heidelberg (2013).
    • (2013) IESS 2013 , vol.403 , pp. 343-352
    • Malipatlolla, S.1    Stierand, I.2
  • 14
    • 0026865757 scopus 로고
    • Allocating hard real-time tasks: An NPHard problem made easy
    • Tindell, K. W., Burns, A., Wellings, A. J.: Allocating hard real-time tasks: An NPHard problem made easy. Real-Time Systems 4, 145-165 (1992).
    • (1992) Real-Time Systems , vol.4 , pp. 145-165
    • Tindell, K.W.1    Burns, A.2    Wellings, A.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.