A model-based approach to integrating security policies for embedded devices.
Michael McDougallRajeev AlurCarl A. GunterPublished in: EMSOFT (2004)
Keyphrases
- embedded devices
- security policies
- access control
- embedded systems
- network security
- distributed systems
- mobile devices
- access control systems
- security requirements
- limited memory
- data storage
- security protocols
- mobile commerce
- network traffic
- information systems
- databases
- electronic commerce
- data mining techniques
- software development
- access control policies
- flash memory