To obtain access to full text of journal and articles you must register!
- Article name
- Configuration of secure systems with embedded and mobile devices
- Authors
- Desnitskiy V. A., , desnitsky@comsec.spb.ru, Institution of the Russian Academy of Sciences St.-Petersburg Institute for Informatics and Automation RAS, Russia
Kotenko I. V., , ivkote@comsec.spb.ru, Institution of the Russian Academy of Sciences St.-Petersburg Institute for Informatics and Automation RAS, Russia
Chechulin A. A., , chechulin@comsec.spb.ru, Institution of the Russian Academy of Sciences St.-Petersburg Institute for Informatics and Automation RAS, Russia
- Keywords
- embedded device / mobile device / security building block / configuration process / optimization problem / optimality criterion
- Year
- 2012 Issue 2 Pages 20 - 28
- Code EDN
- Code DOI
- Abstract
- The paper proposes a model of configuration process for secure systems with embedded and mobile devices as well as architecture of a software tool of the configuration mechanism represented on the basis of UML diagrams. Configuring represents searching for the effective set of particular security building blocks, which are deployed on the device to heighten the security of the services provided by the device. Configuration process is based on solving the optimization problem, where optimality criterion being chosen on the foreground of non-functional properties of security building blocks, whereas the constraints being put on both functional and non-functional properties.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy