SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Martínez López Vicente) srt2:(2005-2009)"

Search: WFRF:(Martínez López Vicente) > (2005-2009)

  • Result 1-10 of 14
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Da Silva Fariña, Antonio, et al. (author)
  • Design and implementation of a Java Fault Injector for Exhaustif SWIFI tool
  • 2009
  • In: Proceedings of 2009 4th International Conference on Dependability of Computer Systems, DepCos-RELCOMEX 2009. - 9780769536743 ; , s. 77-83
  • Conference paper (peer-reviewed)abstract
    • Java is a successful programming environment and its use has grown from little embedded applications until enterprise network servers based on J2EE. This intensive use of Java demands the validation of their fault tolerance mechanisms to avoid unexpected behavior of the applications at runtime. This paper describes the design and implementation of a fault injector for the "Exhaustif®" SWIFI tool. Aspecific fault model for java applications that include class corruption/substitution at loading time, method call interception and unexpected exception thrown is proposed. The injector uses the JVMTI (JavaVirtual Machine Tool Interface) to perform bytecode instrumentation at runtime to carry out the fault model previously defined. Finally a XML formalization of the specific Java fault model is proposed. This approach, JVMTI + XML fault model description, provides complete independency between the system under test and the fault injection tool, as well the interoperability with another SWIFI tools.
  •  
3.
  •  
4.
  •  
5.
  • Hernández, Vicente, et al. (author)
  • Security framework for dpws compliant devices
  • 2009
  • In: 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES. - 9781424443086 ; , s. 87-92
  • Conference paper (peer-reviewed)
  •  
6.
  •  
7.
  • Lopez, Lourdes, et al. (author)
  • ASA : advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM. - 9781595935984 ; , s. Article number a18-
  • Conference paper (peer-reviewed)abstract
    • This paper proposes an architecture for Personal Computers (PC) to avoid BIOS alteration and unauthorized access to resources. This proposal is based on results obtained from study of most popular PC platforms security mechanisms. Authentication controls which are established in PC platform in order to grant operating system booting or BIOS integrity of code mechanism incorporated to secureand avoid executing disallowed code are quite easy to break. The architecture described in the present work (Advanced Secure Architecture - ASA) increase the overall information and system security since prevents an unauthorized platform booting and it provides procedures for BIOS code authentication. On the other hand, ASA overcomes the users' authentication challenge in a corporative environment as well as it offers a very flexible way to specify the Personal Computers Corporation set that a user is allowed to access.
  •  
8.
  •  
9.
  •  
10.
  • Martínez-Ortega, José-Fernán, et al. (author)
  • An approach for applying multi-agent technology into wireless sensor networks
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a22-
  • Conference paper (peer-reviewed)abstract
    • The present work describes how the concepts and foundations defined for multi-agent system technology can be applied in to a Wireless SensorNetwork (WSN), specifically it is focused on how multi-agent system technology's mechanisms and implementations could facilitate the development of systems based on WSN. In this respect, an architectural model where the above mentioned concepts, foundations and mechanisms come together is proposed, in order to define applications and services on WSN. Validation of the proposed architecture is made by means of its use in a perimeter security scenario ("tracking"). It is important to mention, that partial results of this work have been developed in the project PROPSI (Perimeter Protection by means of Wireless Sensor Networks).
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 14

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view