SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:9781595935984 "

Search: L773:9781595935984

  • Result 1-5 of 5
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Da Silva Fariña, Antonio, et al. (author)
  • Exhaustif : a fault injection tool for distributed heterogeneous embedded systems
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a17-
  • Conference paper (peer-reviewed)abstract
    • This paper presents Exhaustif®, a SWIFI fault injection tool for fault tolerance verification and the validation of embedded software in distributedheterogeneous systems. Exhaustif® mainly consists of two parts: EEM and FIK. Exhaustif® Executive Manager (EEM) is a GUI Java application to define the fault injection campaign that uses a SQL database to save the test results obtained from the System under Test (SUT) in order to carry out a post injection data analysis. FIK is under the command of EEM to cary out fault injections in applications running under diverse operating systems using pure SWIFI techniques. Exhaustif® carries out floating point register and memory corruptions using temporary triggers and uses an optimized routine interception mechanism to cany out argument and return value corruption with a minimal time overhead. Two experimentalFault Injector Kernels (FIK) under the RTEMS operating system for an EADS-Astrium SPARC ERC32-based MCM processor board and i386 standard PC mainboard have been developed.
  •  
2.
  • Lopez, Lourdes, et al. (author)
  • ASA : advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM. - 9781595935984 ; , s. Article number a18-
  • Conference paper (peer-reviewed)abstract
    • This paper proposes an architecture for Personal Computers (PC) to avoid BIOS alteration and unauthorized access to resources. This proposal is based on results obtained from study of most popular PC platforms security mechanisms. Authentication controls which are established in PC platform in order to grant operating system booting or BIOS integrity of code mechanism incorporated to secureand avoid executing disallowed code are quite easy to break. The architecture described in the present work (Advanced Secure Architecture - ASA) increase the overall information and system security since prevents an unauthorized platform booting and it provides procedures for BIOS code authentication. On the other hand, ASA overcomes the users' authentication challenge in a corporative environment as well as it offers a very flexible way to specify the Personal Computers Corporation set that a user is allowed to access.
  •  
3.
  • Martínez-Ortega, José-Fernán, et al. (author)
  • An approach for applying multi-agent technology into wireless sensor networks
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a22-
  • Conference paper (peer-reviewed)abstract
    • The present work describes how the concepts and foundations defined for multi-agent system technology can be applied in to a Wireless SensorNetwork (WSN), specifically it is focused on how multi-agent system technology's mechanisms and implementations could facilitate the development of systems based on WSN. In this respect, an architectural model where the above mentioned concepts, foundations and mechanisms come together is proposed, in order to define applications and services on WSN. Validation of the proposed architecture is made by means of its use in a perimeter security scenario ("tracking"). It is important to mention, that partial results of this work have been developed in the project PROPSI (Perimeter Protection by means of Wireless Sensor Networks).
  •  
4.
  • Martínez-Ortega, José-Fernán, et al. (author)
  • QoS in wireless sensor networks : survey and approach
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a20-
  • Conference paper (peer-reviewed)abstract
    • A wireless sensor network (WSN) is a computer wireless network composed of spatially distributed and autonomous tiny nodes - smart dustsensors, motes -, which cooperatively monitor physical or environmental conditions. Nowadays these kinds of networks support a wide range of applications, such as target tracking, security, environmental control, habitat monitoring, source detection, source localization, vehicular and traffic monitoring, health monitoring, building and industrial monitoring, etc. Many of these applications have strong requirements for end-to-end delay and losses during data transmissions. In this work we have classified the main mechanisms that have been proposed to provide Quality of Service (QoS) in WSN at Medium Access Control (MAC) and network layers. Finally, taking into account some particularities of the studied MAC- andnetwork-layer protocols, we have selected a real application scenario in order to show how to choose an appropriate approach for guaranteeing performance in a WSN deployed application.
  •  
5.
  • Martínez-Ortega, José-Fernán, et al. (author)
  • Security services provision for telematic services at the knowledge and information society
  • 2007
  • In: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a41-
  • Conference paper (peer-reviewed)abstract
    • The Knowledge and Information Society development has promoted the evolution of telematic services, such as those for e-govemment and e-health, which aim to offer feasible solutions to social and citizens problems that will strengthen the democracy, foster citizens equal opportunities and ease their participation in the processes of the public administration and the help to the needy. Though the different telematic services are internally constituted for similar or even identical subservices, the interoperability is not possible among them and components sharing either. In order to encourage the development of the above mentioned type of services, the present article proposes an architecture that contributes to the interoperability and sharing of subservices. This architecture derives from the study of two scenarios, one of e-health and other one of e-goverment, with similar needs of security for the user' or elements authentication and the operations authorization.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-5 of 5

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view