Vehicle ECU classification based on safety-security characteristics

DK Nilsson, PH Phung… - IET Road Transport …, 2008 - ieeexplore.ieee.org
An upcoming trend for automotive manufacturers is to perform remote diagnostics and
firmware updates over the air, which allows identifying hardware problems and correction of …

ExPDT: A policy-based approach for automating compliance

S Sackmann, M Kähmer - Wirtschaftsinformatik, 2008 - Springer
Remaining in compliance with growing requirements from new laws, regulations, standards,
or contracts demands increasing IT support beyond simple reporting tools or archiving …

A reference model for process-oriented it risk management

S Sackmann - 2008 - aisel.aisnet.org
The economic relevance of IT risks is increasing due to various operational, technical as
well as regulatory reasons. Increasing flexibility of business processes and increasing …

XMem: type-safe, transparent, shared memory for cross-runtime communication and coordination

M Wegiel, C Krintz - ACM SIGPLAN Notices, 2008 - dl.acm.org
Developers commonly build contemporary enterprise applications using type-safe,
component-based platforms, such as J2EE, and architect them to comprise multiple tiers …

Security policy enforcement in the OSGi framework using aspect-oriented programming

PH Phung, D Sands - 2008 32nd Annual IEEE International …, 2008 - ieeexplore.ieee.org
The lifecycle mismatch between vehicles and their IT system poses a problem for the
automotive industry. Such systems need to be open and extensible to provide customised …

[PDF][PDF] Automated counterexample-driven audits of authentic system records.

R Accorsi - 2008 - freidok.uni-freiburg.de
Die edle Kraft bei mir wäre demselben Schicksal geweiht wie die Hyperions, wäre ich
während der Arbeit an meiner Promotion nicht vielen begegnet, die die unersetzliche Rolle …

ExPDT: Ein policy-basierter ansatz zur automatisierung von compliance

S Sackmann, M Kähmer - Wirtschaftsinformatik, 2008 - infona.pl
Remaining in compliance with growing requirements from new laws, regulations, standards,
or contracts demands increasing IT support beyond simple reporting tools or archiving …

Simulating midlet's security claims with automata modulo theory

F Massacci, ISR Siahaan - Proceedings of the third ACM SIGPLAN …, 2008 - dl.acm.org
Model-carrying code and security-by-contract have proposed to augment mobile code with a
claim on its security behavior that could be matched against a mobile platform policy before …

From flow logic to static type systems for coordination languages

R De Nicola, D Gorla, RR Hansen, F Nielson… - … Models and Languages …, 2008 - Springer
Coordination languages are often used to describe open ended systems. This makes it
challenging to develop tools for guaranteeing security of the coordinated systems and …

Lambda-RBAC: Programming with role-based access control

R Jagadeesan, A Jeffrey, C Pitcher… - Logical Methods in …, 2008 - lmcs.episciences.org
We study mechanisms that permit program components to express role constraints on
clients, focusing on programmatic security mechanisms, which permit access controls to be …