2016
DOI: 10.1515/itit-2016-0032
|View full text |Cite
|
Sign up to set email alerts
|

Providing security on demand using invasive computing

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…In addition, DMR schemes can be used for error signaling. Finally, also certain security properties such as confidentiality of program and data may be formulated as requirements to protect individual application programs against attackers 50 . In summary, we see a major strength of invasive computing to act as the advocate of (a) the individual rather than a collection of programs and (b) enabling guarantees for not only one but a plethora of requirements on the execution of an application program.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, DMR schemes can be used for error signaling. Finally, also certain security properties such as confidentiality of program and data may be formulated as requirements to protect individual application programs against attackers 50 . In summary, we see a major strength of invasive computing to act as the advocate of (a) the individual rather than a collection of programs and (b) enabling guarantees for not only one but a plethora of requirements on the execution of an application program.…”
Section: Discussionmentioning
confidence: 99%
“…Possible voting schemes for TMR execution of a parallel loop nest on an invasive TCPA with voting (A) for every loop iteration ( immediate voting ), (B) at the border of each PE's iteration space ( early voting ), and (C) at the border of the array ( late voting ) 50 …”
Section: Predictability Of Non‐functional Program Execution Propertiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Whereas, hard requirements must never be violated. Details on security and reliability requirements can be found in [9] and [15].…”
Section: Constraints and User Requirementsmentioning
confidence: 99%