Transaction Security System, IBM Systems Journal, vol.30, issue.2, pp.206-228, 1991. ,
DOI : 10.1147/sj.302.0206
Distributed Detection of Multi-Hop Information Flows With Fusion Capacity Constraints, IEEE Transactions on Signal Processing, vol.58, issue.6, pp.3373-3383, 2010. ,
DOI : 10.1109/TSP.2010.2044249
Embedded security: challenges and concerns, Computer, vol.34, issue.10, pp.40-41, 2001. ,
DOI : 10.1109/MC.2001.955096
A model checking-based approach for security policy verification of mobile systems, Formal Aspects of Computing, vol.24, issue.5, pp.627-648, 2011. ,
DOI : 10.1007/s00165-010-0159-y
URL : https://hal.archives-ouvertes.fr/hal-00618198
Design challenges for secure implantable medical devices, Proceedings of the 49th Annual Design Automation Conference on, DAC '12, pp.12-17, 2012. ,
DOI : 10.1145/2228360.2228364
An Approach for Network Information Flow Analysis for Systems of Embedded Components, In: LNCS, vol.7531, pp.146-155, 2012. ,
DOI : 10.1007/978-3-642-33704-8_13
An intruder model for verifying liveness in security protocols, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.23-32, 2006. ,
DOI : 10.1145/1180337.1180340
Configuration-Based Approach to Embedded Device Security, LNCS, vol.7531, pp.270-285, 2012. ,
DOI : 10.1007/978-3-642-33704-8_23
High-speed security, Communications Engineer, vol.2, issue.2, pp.37-39, 2004. ,
DOI : 10.1049/ce:20040207
Conflicting criteria in embedded system design, IEEE Design & Test of Computers, vol.17, issue.2, pp.51-59, 2000. ,
DOI : 10.1109/54.844334
Privacy Engineering for Digital Rights Management Systems, Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management, pp.76-105, 2001. ,
DOI : 10.1007/3-540-47870-1_6
Reconfigurable Security Primitive for Embedded Systems, 2005 International Symposium on System-on-Chip, pp.23-28, 2005. ,
DOI : 10.1109/ISSOC.2005.1595635
URL : https://hal.archives-ouvertes.fr/hal-00089411
Practical Secure Hardware Design for Embedded Systems, Proceedings of the 2004 Embedded Systems Conference, 2004. ,
A Perspective on Information-Flow. In: summer school Control Tools for Analysis and Verification of Software Safety and Security, 2011. ,
Using resource balancing to configure modular systems, Intelligent Systems and their Applications, pp.50-58, 1998. ,
DOI : 10.1109/5254.708433
Design Methods for Embedded Security, In: Telfor Journal, vol.1, issue.2, 2009. ,
Security as a new dimension in embedded system design, Proceedings of the 41st Design Automation Conference, pp.753-760, 2004. ,
Design principles for tamper-resistant smartcard processors, Proceedings of the USENIX Workshop on Smartcard Technology, pp.9-20, 1999. ,
Embedded system security, Computer, vol.37, issue.7, 2004. ,
DOI : 10.1109/MC.2004.52
Verification of security policy filtering rules by Model Checking, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, pp.706-710, 2011. ,
DOI : 10.1109/IDAACS.2011.6072862
The UML Profile for MARTE: Modeling and Analysis of Real-Time and Embedded Systems, 2011. ,
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices, 2010 43rd Hawaii International Conference on System Sciences, pp.1-9, 2010. ,
DOI : 10.1109/HICSS.2010.170
Reducing normative conflicts in information security, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.11-24, 2011. ,
DOI : 10.1145/2073276.2073279
A survey of static analysis methods for identifying security vulnerabilities in software systems, IBM Systems Journal, vol.46, issue.2, 2007. ,
DOI : 10.1147/sj.462.0265
A Taxonomy of Attacks on Secure Devices In: Australian Information Warfare and IT Security, pp.251-264, 2003. ,
Identifying Critical Components during Information Security Evaluations, Journal of Research and Practice in Information Technology, pp.391-402, 2005. ,
Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004. ,
DOI : 10.1145/1015047.1015049
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing ,
DOI : 10.1109/PDP.2012.36
Security Engineering and Modelling of Set-Top Boxes, 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom), pp.113-122, 2012. ,
DOI : 10.1109/BioMedCom.2012.25
Product configuration frameworks-a survey, Intelligent Systems and their Applications IEEE Computer Society, pp.42-49, 1998. ,
DOI : 10.1109/5254.708432
Design of Secure and energy-efficient embedded systems for Future internet applications, FP7 Project Web site ,
A New Construction Method for Networks from Matroids, Proceedings of the 2009 Symposium on Information Theory, 2009. ,
Exposing Security Risks for Commercial Mobile Devices, Computer Network Security, pp.3-5, 2012. ,
DOI : 10.1007/978-3-642-33704-8_2
An Approach of Product Configuration Based on Decision Tree and Minimum Conflicts Repair Algorithm, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, pp.126-129, 2009. ,
DOI : 10.1109/ICIII.2009.37
A Configuration Tool to Increase Product Competitiveness, IEEE Intelligent Systems 13, pp.34-41, 1998. ,