Login / Signup
Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis.
Nan Wang
Song Chen
Jianmo Ni
Xiaofeng Ling
Yu Zhu
Published in:
IEEE Access (2018)
Keyphrases
</>
high level synthesis
security policies
access control
sensitive data
intrusion detection
information security
network security
cloud computing environment
third party
scheduling algorithm
security issues
information systems
sensor networks
computing environments
encryption scheme
parallel architecture