Embedded systems for specific purposes perform certain roles in various environments. Security of embedded systems is becoming a paramount concern, and once a problem occurs in embedded systems, can lead to fatal accidents. Therefore, we need security policy for embedded systems. However, due to the limited size and performance, security techniques developed for enterprise and desktop computing might not satisfy embedded application requirements. In this paper, we analyze existing security policies and divide malicious attacks into three sections, and then present the security process model of embedded systems. © 2011 Springer-Verlag.
CITATION STYLE
Choi, S. H. (2011). The security process model of embedded systems. In Communications in Computer and Information Science (Vol. 261 CCIS, pp. 329–334). https://doi.org/10.1007/978-3-642-27180-9_40
Mendeley helps you to discover research relevant for your work.