SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Martinez Garcia Belen) ;pers:(Hernández Vicente)"

Sökning: WFRF:(Martinez Garcia Belen) > Hernández Vicente

  • Resultat 1-10 av 14
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Da Silva Fariña, Antonio, et al. (författare)
  • Design and implementation of a Java Fault Injector for Exhaustif SWIFI tool
  • 2009
  • Ingår i: Proceedings of 2009 4th International Conference on Dependability of Computer Systems, DepCos-RELCOMEX 2009. - 9780769536743 ; , s. 77-83
  • Konferensbidrag (refereegranskat)abstract
    • Java is a successful programming environment and its use has grown from little embedded applications until enterprise network servers based on J2EE. This intensive use of Java demands the validation of their fault tolerance mechanisms to avoid unexpected behavior of the applications at runtime. This paper describes the design and implementation of a fault injector for the "Exhaustif®" SWIFI tool. Aspecific fault model for java applications that include class corruption/substitution at loading time, method call interception and unexpected exception thrown is proposed. The injector uses the JVMTI (JavaVirtual Machine Tool Interface) to perform bytecode instrumentation at runtime to carry out the fault model previously defined. Finally a XML formalization of the specific Java fault model is proposed. This approach, JVMTI + XML fault model description, provides complete independency between the system under test and the fault injection tool, as well the interoperability with another SWIFI tools.
  •  
3.
  •  
4.
  • Da Silva Fariña, Antonio, et al. (författare)
  • XML Schema Based Fault-Set Definition to Improve Fault Injection Tools Interoperability
  • 2010
  • Ingår i: International Journal of Critical Computer-Based Systems. - : InderScience Publishers. - 1757-8779 .- 1757-8787. ; 1:1-3, s. 220-237
  • Tidskriftsartikel (refereegranskat)abstract
    • Software implemented fault injection tools (SWIFI) use fault injectors to carry out the fault injection campaign defined in a GUI-based application. However, the communication between the fault injector and the application is defined in an ad-hoc manner. This paper describes an XML schema formalisation approach for the definition of fault sets which specify low level memory and/or register value corruptions in embedded microprocessor-based systems and resource usage faults in host based systems. Through this proposed XML schema definition, different injectors could be used to carry out the same fault set injection. To validate this approach an experimental tool called Exhaustif®, consisting of a GUI Java application for defining the fault sets and injection policies, one injector for Windows hosts systems and two injectors for Sparc and i386 architectures under RTEMS have been developed. 
  •  
5.
  • Hernández, Vicente, et al. (författare)
  • Security framework for dpws compliant devices
  • 2009
  • Ingår i: 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES. - 9781424443086 ; , s. 87-92
  • Konferensbidrag (refereegranskat)
  •  
6.
  •  
7.
  • Lopez, Lourdes, et al. (författare)
  • ASA : advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS
  • 2007
  • Ingår i: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM. - 9781595935984 ; , s. Article number a18-
  • Konferensbidrag (refereegranskat)abstract
    • This paper proposes an architecture for Personal Computers (PC) to avoid BIOS alteration and unauthorized access to resources. This proposal is based on results obtained from study of most popular PC platforms security mechanisms. Authentication controls which are established in PC platform in order to grant operating system booting or BIOS integrity of code mechanism incorporated to secureand avoid executing disallowed code are quite easy to break. The architecture described in the present work (Advanced Secure Architecture - ASA) increase the overall information and system security since prevents an unauthorized platform booting and it provides procedures for BIOS code authentication. On the other hand, ASA overcomes the users' authentication challenge in a corporative environment as well as it offers a very flexible way to specify the Personal Computers Corporation set that a user is allowed to access.
  •  
8.
  •  
9.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • An approach for applying multi-agent technology into wireless sensor networks
  • 2007
  • Ingår i: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a22-
  • Konferensbidrag (refereegranskat)abstract
    • The present work describes how the concepts and foundations defined for multi-agent system technology can be applied in to a Wireless SensorNetwork (WSN), specifically it is focused on how multi-agent system technology's mechanisms and implementations could facilitate the development of systems based on WSN. In this respect, an architectural model where the above mentioned concepts, foundations and mechanisms come together is proposed, in order to define applications and services on WSN. Validation of the proposed architecture is made by means of its use in a perimeter security scenario ("tracking"). It is important to mention, that partial results of this work have been developed in the project PROPSI (Perimeter Protection by means of Wireless Sensor Networks).
  •  
10.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • Guaranteeing QoS in Wireless Sensor Networks
  • 2008
  • Ingår i: Wireless Quality of Service. - : Auerbach Publications. - 9781420051308 ; , s. 251-289
  • Bokkapitel (refereegranskat)
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 14

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy