Login / Signup

Worst-case execution time analysis of security policies for deeply embedded real-time systems.

Sibin Mohan
Published in: SIGBED Rev. (2008)
Keyphrases
  • security policies
  • access control
  • databases
  • information systems
  • data analysis
  • software engineering
  • software architecture
  • embedded systems
  • security requirements