Filters








34,185 Hits in 6.1 sec

A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments

Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, HeeJo Lee
2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007)  
and flexible way. 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications(RTCSA 2007) 0-7695-2975-5/07 $25.00  ...  Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing.  ...  Computing Systems and Applications(RTCSA 2007) 0-7695-2975-5/07 $25.00 © 2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications(RTCSA 2007) 0-7695-2975  ... 
doi:10.1109/rtcsa.2007.11 dblp:conf/rtcsa/DiepLLL07 fatcat:7ux5l3rqcjbzvegnbal4gcg33m

Fundamental Design Principles for Embedded Systems: The Architectural Style of the Cross-Domain Architecture GENESYS

Roman Obermaisser, Christian El Salloum, Bernhard Huber, Hermann Kopetz
2009 2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing  
a common time, hierarchical system structure, adherence to message passing, state awareness, fault isolation and integrated resource management.  ...  The GENESYS (Generic Embedded System) project is a European research project that aims to develop a cross-domain architecture for embedded systems.  ...  Security The architectural principles strict component orientation, separation of communication and computation and fault isolation ensure that components constitute FCRs by design and that the interactions  ... 
doi:10.1109/isorc.2009.12 dblp:conf/isorc/ObermaisserSHK09 fatcat:iqhjpxzzl5bb3e7ljwqp6jbcjq

Embedded virtualization for the design of secure IoT applications

Carlos Moratelli, Sergio Johann, Marcelo Neves, Fabiano Hessel
2016 Proceedings of the 27th International Symposium on Rapid System Prototyping Shortening the Path from Specification to Prototype - RSP '16  
One is security due to separation, where the hypervisor ensures that one domain does not compromise the execution of other domains.  ...  Embedded virtualization has emerged as a valuable way to reduce costs, improve software quality, and decrease design time.  ...  They apply several conventional security approaches such as authentication schemes to ensure the confidentiality and integrity of data.  ... 
doi:10.1145/2990299.2990301 dblp:conf/rsp/MoratelliFNH16 fatcat:vsp3mtt2yrhchbmbvaslfs3zge

Distributed Real-Time Managed Systems: A Model-Driven Distributed Secure Information Architecture Platform for Managed Embedded Systems

Tihamer Levendovszky, Abhishek Dubey, William R. Otte, Daniel Balasubramanian, Alessandro Coglio, Sandor Nyako, William Emfinger, Pranav Kumar, Aniruddha Gokhale, Gabor Karsai
2014 IEEE Software  
We thank Olin Sibert of Oxford Systems and all the team members of our project for their invaluable input and contributions to this effort.  ...  Any opinions, fi ndings, and conclusions or recommendations expressed in this material are those of the authors and do not refl ect the views of DARPA.  ...  It consists of two main parts: on a network of embedded, mobile nodes.  ... 
doi:10.1109/ms.2013.143 fatcat:hcnyr3z2sjfqrnzcnxklickgxy

Misconceptions about real-time databases

J.A. Stankovic, Sang Hyuk Son, J. Hansson
1999 Computer  
atabases have become an integral part of many computer systems-ranging from complex systems that control air traffic, plant operations, and stock market transactions to general-purpose computing systems  ...  Absolute time consistency means that individual data items used by a transaction are still temporally valid and reflect the true state of the world to an acceptable degree of accuracy.  ...  to general-purpose computing systems that run audio and video applications.  ... 
doi:10.1109/2.769440 fatcat:fgewots6vve5lhsvjqb55xcoxm

Enabling Next-Generation RFID Applications: Solutions and Challenges

Quan Z. Sheng, Xue Li, Sherali Zeadally
2008 Computer  
Sophisticated security measures must be in place to ensure the safe protection of RFID applications. Openness. System interoperability is another important parameter in RFID data integration.  ...  His research interests include computer networks, mobile computing, RFID, network and system security, and ubiquitous computing.  ... 
doi:10.1109/mc.2008.386 fatcat:y7a6zoud6nckjjfzz7dztiys7q

Mixed Criticality in Control Systems

Alfons Crespo, Alejandro Alonso, Marga Marcos, Juan A. de la Puente, Patricia Balbastre
2014 IFAC Proceedings Volumes  
The complexity of industrial embedded systems is increasing continuously. Companies try to keep a leading position by offering additional functionalities and services.  ...  Systems are to be composed by multiple sensor, actuation and computation subsystems running in a coordinated way on a distributed platform.  ...  ), and by the Spanish National R&D&I program, project HI-PARTES (TIN2011-28567-C03).  ... 
doi:10.3182/20140824-6-za-1003.02004 fatcat:kus2lqmzi5b63ctyukhshw4xfq

Ensuring security of H.264 videos by using watermarking

Marc Chaumont, Sos S. Agaian, Sabah A. Jassim, Yingzi Du
2011 Mobile Multimedia/Image Processing, Security, and Applications 2011  
The specific example of traitor tracing will be presented. Deadlocks will be discussed, and then the possible extensions and the future applications will conclude the presentation.  ...  For example, a simple re-compression of a DVD movie (MPEG2 compression) to a DivX movie will defeat most of the current state-of-the-art watermarking systems.  ...  of the two type of attacks (collusion type I and II) are presented and the two main security applications are evoked: the copyright application and the traitor tracing application.  ... 
doi:10.1117/12.882742 fatcat:jfjf3q3pvvgsnjr4wqwjljf3vi

Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System

Raimarius Delgado, Jaeho Park, Cheonho Lee, Byoung Wook Choi
2020 Applied Sciences  
In particular, ensuring the safe operation of industrial control systems requires the system to be governed by stringent temporal constraints and should satisfy real-time requirements.  ...  Android is gaining popularity as the operating system of embedded systems and recent demands of its application on industrial control are steadily increasing.  ...  Conflicts of Interest: The authors declare no conflict of interest. Appl. Sci. 2020, 10, 2796  ... 
doi:10.3390/app10082796 doaj:c8a4bcc1716841b69afaeac26aeb5ca2 fatcat:feoznolepbfrrfkl6acsiao6fa

A Safety Concept for a Railway Mixed-Criticality Embedded System Based on Multicore Partitioning

Irune Agirre, Mikel Azkarate-Askasua, Asier Larrucea, Jon Perez, Tullio Vardanega, Francisco J. Cazorla
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
The development of mixed-criticality systems that integrate applications of different criticality levels (safety, security, real-time and non real-time) can provide multiple benefits such as product cost-size-weight  ...  However, the integration of applications of different levels of criticality leads to several challenges with respect to safety certification standards.  ...  The integration of applications of different criticality (safety, security, real-time and non-real time) in a single embedded system is referred as mixed-criticality system.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.268 dblp:conf/IEEEcit/AgirreALPVC15 fatcat:yvh7hylpjjedtiob6sgm6ews2y

The Role of Mixed Criticality Technology in Industry 4.0

José Simó, Patricia Balbastre, Juan Francisco Blanes, José-Luis Poza-Luján, Ana Guasque
2021 Electronics  
In these applications, it is necessary to manage different components of an application according to their levels of criticality.  ...  Embedded systems used in critical systems, such as aeronautics, have undergone continuous evolution in recent years.  ...  ensure freedom of interference of mixed critical applications (as required by security standards) through temporal and spatial segregation, or the management of failure scenarios considered at design  ... 
doi:10.3390/electronics10030226 fatcat:32r6s4u77rglldnkdkstp3grjy

Security and Reliability of Safety-Critical RTOS

Ryan Luna, Sheikh Ariful Islam
2021 SN Computer Science  
Hence, the reliability and security of embedded systems running on top of RTOS are equally important.  ...  This article presents an in-depth and systematic review of the security and reliability of safety-critical systems.  ...  Therefore, predictability must also be ensured through the proper integration of security measures.  ... 
doi:10.1007/s42979-021-00753-y fatcat:janiiponebgqjm3mluq3g77b4q

Towards Secure Time-Triggered Systems [chapter]

Florian Skopik, Albert Treytl, Arjan Geven, Bernd Hirschler, Thomas Bleier, Andreas Eckel, Christian El-Salloum, Armin Wasicek
2012 Lecture Notes in Computer Science  
This paper presents the development of a novel joint safety and security architecture for dependable embedded time-triggered systems.  ...  A particular focus is on synergistic effects of security and safety-related functions, thereby supporting the roll-out of safety-critical embedded systems even in 'untrusted' environments.  ...  -Protection of temporal properties of a real-time system in addition to the standard security attributes, authenticity, integrity and confidentiality.  ... 
doi:10.1007/978-3-642-33675-1_33 fatcat:ylelxedg7ndnxioxsh7wihx3wi

In car embedded electronic architectures: How to ensure their safety

Françoise Simonot-Lion
2003 IFAC Proceedings Volumes  
In this paper, we intend to list certain activities and key points for ensuring the development of a safe and optimized embedded system.  ...  The first one identifies the generic components of an embedded system while the second one details how to model and validate the embedded system throughout the different steps of the development process  ...  their essential contributions to the definition of the AIL_Transport language and Nicolas Navet for the fruitful debates that we had on this topic.  ... 
doi:10.1016/s1474-6670(17)32457-6 fatcat:xsf2xf7vfvgsfhv6u3xnix53hu

Guest Editorial Special Issue on Control of Cyber-Physical Systems

Karl H. Johansson, George J. Pappas, Paulo Tabuada, Claire J. Tomlin
2014 IEEE Transactions on Automatic Control  
ACKNOWLEDGMENT The guest editors wish to thank all the authors, for their submissions, and the large number of reviewers, who carefully and timely scrutinized and evaluated the many papers submitted.  ...  Cyber-Physical Security Cyber-physical control systems are vulnerable to adversaries due to the use of open computation and communication platforms.  ...  Resource-Constrained Embedded and Wireless Control Cyber-physical systems are in many cases implemented over resource-constrained embedded platforms, which integrate limited computational capacity with  ... 
doi:10.1109/tac.2014.2363896 fatcat:u2gu5qow5rfvzaapnnac63usmm
« Previous Showing results 1 — 15 out of 34,185 results