2005
DOI: 10.1007/11591962_11
|View full text |Cite
|
Sign up to set email alerts
|

CoConES: An Approach for Components and Contracts in Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…With our increasing dependence on embedded systems, their reliability and security become the most important issue, because embedded systems (e.g., smart phones) are used to perform financial transactions and also to store increasing amounts of sensitive personal data [10]. Therefore secure embedded systems are typically characterized by a specific functionality in a specific domain, where the software element is taking an increasingly important role [11]. Secure embedded software typically faces some unique constraints not found in desktop software or enterprise systems, such as limited resources, real-time requirements, hardware integration, cryptographic algorithms, and authenticity.…”
Section: A Secure Embedded System Andmentioning
confidence: 99%
“…With our increasing dependence on embedded systems, their reliability and security become the most important issue, because embedded systems (e.g., smart phones) are used to perform financial transactions and also to store increasing amounts of sensitive personal data [10]. Therefore secure embedded systems are typically characterized by a specific functionality in a specific domain, where the software element is taking an increasingly important role [11]. Secure embedded software typically faces some unique constraints not found in desktop software or enterprise systems, such as limited resources, real-time requirements, hardware integration, cryptographic algorithms, and authenticity.…”
Section: A Secure Embedded System Andmentioning
confidence: 99%
“…These constructs capture behavioral dependencies specified with a set of preconditions and invariants [30]. The contract principle was also applied to component-based systems, to extend component interfaces with behavioral constraints [10]. Hereby, contracts are used to check the compliance of components.…”
Section: Interaction-based Approachesmentioning
confidence: 99%
“…Behavior protocols [8] and contracts [9] have been mainly used to formalize component interaction and utilized for design-time verification. The scheme proposed by Thai et al in [10] detects errors by checking consistency of states.…”
Section: Related Workmentioning
confidence: 99%