咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 电气工程
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 programming lang...
  • 1 篇 access control
  • 1 篇 verifiable embed...
  • 1 篇 operating system...
  • 1 篇 security holes
  • 1 篇 security of data
  • 1 篇 embedded systems
  • 1 篇 data encryption
  • 1 篇 input-output arc...
  • 1 篇 instruction sets
  • 1 篇 bottom up approa...
  • 1 篇 instruction set ...
  • 1 篇 formal verificat...
  • 1 篇 operating system
  • 1 篇 information flow...

机构

  • 1 篇 northwestern pol...

作者

  • 1 篇 ma bo
  • 1 篇 mu dejun
  • 1 篇 mao baolei
  • 1 篇 hu wei

语言

  • 1 篇 英文
检索条件"主题词=input-output architecture"
1 条 记 录,以下是1-10 订阅
排序:
A bottom-up approach to verifiable embedded system information flow security
收藏 引用
IET INFORMATION SECURITY 2014年 第1期8卷 12-17页
作者: Mu, Dejun Hu, Wei Mao, Baolei Ma, Bo Northwestern Polytech Univ Sch Automat Xian 710072 Peoples R China
With the wide deployment of embedded systems and constant increase in their inter-connections, embedded systems tend to be confronted with attacks through security holes that are hard to predict using typical security... 详细信息
来源: 评论