The security process model of embedded systems

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Embedded systems for specific purposes perform certain roles in various environments. Security of embedded systems is becoming a paramount concern, and once a problem occurs in embedded systems, can lead to fatal accidents. Therefore, we need security policy for embedded systems. However, due to the limited size and performance, security techniques developed for enterprise and desktop computing might not satisfy embedded application requirements. In this paper, we analyze existing security policies and divide malicious attacks into three sections, and then present the security process model of embedded systems. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Choi, S. H. (2011). The security process model of embedded systems. In Communications in Computer and Information Science (Vol. 261 CCIS, pp. 329–334). https://doi.org/10.1007/978-3-642-27180-9_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free