loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock
A Security-enhanced Design Methodology for Embedded Systems

Topics: Management of Computing Security; Security and Privacy in Mobile Systems; Security and Privacy in Pervasive/Ubiquitous Computing; Security Deployment; Security Engineering; Security Metrics and Measurement; Security Requirements; Service and Systems Design and Qos Network Security

Authors: Alberto Ferrante ; Jelena Milosevic and Marija Janjušević

Affiliation: University of Lugano, Switzerland

Keyword(s): Security, Design Methodology, Embedded Systems, Security Metric, Metric, AHP.

Related Ontology Subjects/Areas/Topics: Cloud Computing ; Data and Application Security and Privacy ; Information and Systems Security ; Information Assurance ; Management of Computing Security ; Security and Privacy in Mobile Systems ; Security and Privacy in Pervasive/Ubiquitous Computing ; Security Deployment ; Security Engineering ; Security in Information Systems ; Security Metrics and Measurement ; Security Requirements ; Service and Systems Design and Qos Network Security ; Services Science

Abstract: Designing an embedded system is a complex process that involves working both on hardware and on software. Designers often optimize the systems that they design for specific applications; an optimal system is the one that can execute the desired set of applications with the required performances at the lowest possible cost. Cost may be expressed in different ways such as, for example, energy consumption and/or silicon area. Security is being, in the common practice, disregarded during this phase and inserted in later stages of the design process, thus obtaining non optimal and/or non safe systems. In this paper we propose a design methodology for embedded systems that integrate the choice of suitable design solutions into the early stages of the design process. The main purpose of this methodology is to provide a way to evaluate security as an additional optimization parameter. Along with a description of the methodology, in this paper we also show a case study that explains how the m ethodology can be applied and that proves its effectiveness. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.217.60.35

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Ferrante, A.; Milosevic, J. and Janjušević, M. (2013). A Security-enhanced Design Methodology for Embedded Systems. In Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT; ISBN 978-989-8565-73-0; ISSN 2184-3236, SciTePress, pages 39-50. DOI: 10.5220/0004501000390050

@conference{secrypt13,
author={Alberto Ferrante. and Jelena Milosevic. and Marija Janjušević.},
title={A Security-enhanced Design Methodology for Embedded Systems},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT},
year={2013},
pages={39-50},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004501000390050},
isbn={978-989-8565-73-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT
TI - A Security-enhanced Design Methodology for Embedded Systems
SN - 978-989-8565-73-0
IS - 2184-3236
AU - Ferrante, A.
AU - Milosevic, J.
AU - Janjušević, M.
PY - 2013
SP - 39
EP - 50
DO - 10.5220/0004501000390050
PB - SciTePress