Secure Information Sharing in Mixed – Criticality Systems
暂无分享,去创建一个
[2] Raymond T. Ng,et al. Distance-based outliers: algorithms and applications , 2000, The VLDB Journal.
[3] Hermann Kopetz,et al. A System-on-a-Chip Platform for Mixed-Criticality Applications , 2010, 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing.
[4] Amanda Kate Delaney,et al. Effectiveness of ABS and Vehicle Stability Control Systems , 2004 .
[5] J. Rushby,et al. The MILS component integration approach to secure information sharing , 2008, 2008 IEEE/AIAA 27th Digital Avionics Systems Conference.
[6] Roman Obermaisser,et al. From a Federated to an Integrated Automotive Architecture , 2008 .
[7] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[8] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[9] Christian El Salloum,et al. The ACROSS MPSoC -- A New Generation of Multi-core Processors Designed for Safety-Critical Embedded Systems , 2012, 2012 15th Euromicro Conference on Digital System Design.
[10] Yves Deswarte,et al. Supporting multiple levels of criticality , 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224).
[11] Jean Arlat,et al. Connecting commercial computers to avionics systems , 2009, 2009 IEEE/AIAA 28th Digital Avionics Systems Conference.
[12] J. Tukey,et al. Variations of Box Plots , 1978 .
[13] Hermann Kopetz,et al. Why time-triggered architectures will succeed in large hard real-time systems , 1995, Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems.
[14] Dave E. Eckhardt,et al. A theoretical investigation of generalized voters for redundant systems , 1989, [1989] The Nineteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.
[15] Algirdas A. Avi. The Methodology of N-Version Programming , 1995 .