|
Trudy SPIIRAN, 2013, Issue 30, Pages 40–55
(Mi trspy689)
|
|
|
|
Configuring embedded information protection systems within services providing complex security on rail transport
V. Desnitsky, I. V. Kotenko St. Petersburg Institute for Informatics and Automation of RAS
Abstract:
The paper encompasses a design conception for combined embedded device security to be applied within the development process of protection mechanisms for systems and services of complex security on rail transport. A model and technique proposed are intended for configuring embedded device security components developed taking into consideration expert knowledge in the embedded security field. The goal of the configuration process is to find a security configuration that meets all necessary security requirements and constraints of the device platform, satisfies set resource consumption criteria and does not contain known types of security component inconsistencies.
Keywords:
embedded devices, information security, configuring process.
Received: 11.10.2013
Citation:
V. Desnitsky, I. V. Kotenko, “Configuring embedded information protection systems within services providing complex security on rail transport”, Tr. SPIIRAN, 30 (2013), 40–55
Linking options:
https://www.mathnet.ru/eng/trspy689 https://www.mathnet.ru/eng/trspy/v30/p40
|
Statistics & downloads: |
Abstract page: | 126 | Full-text PDF : | 62 | References: | 29 | First page: | 1 |
|