[HTML][HTML] Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
A Kousalya, N Baik - International Journal of Intelligent Networks, 2023 - Elsevier
In the current era, numerous products are accessible online from anywhere and every
minute. This work used encryption with access management because authenticities …
minute. This work used encryption with access management because authenticities …
Verified hardware/software co-assurance: Enhancing safety and security for critical systems
DS Hardin - 2020 IEEE International Systems Conference …, 2020 - ieeexplore.ieee.org
Experienced developers of safety-critical and security-critical systems have long
emphasized the importance of applying the highest degree of scrutiny to a system's I/O …
emphasized the importance of applying the highest degree of scrutiny to a system's I/O …
Formal synthesis of filter components for use in security-enhancing architectural transformations
DS Hardin, KL Slind - 2021 IEEE Security and Privacy …, 2021 - ieeexplore.ieee.org
Safety-and security-critical developers have long recognized the importance of applying a
high degree of scrutiny to a system's (or subsystem's) I/O messages. However, lack of care in …
high degree of scrutiny to a system's (or subsystem's) I/O messages. However, lack of care in …
Integrated Modeling, Verification, and Code Generation for Unmanned Aerial Systems
J Zhang, L Zhang, Y Wu, L Ma, F Yang - arXiv preprint arXiv:2406.09485, 2024 - arxiv.org
Unmanned Aerial Systems (UAS) are currently widely used in safety-critical fields such as
industrial production, military operations, and disaster relief. Due to the diversity and …
industrial production, military operations, and disaster relief. Due to the diversity and …
A rigorous system engineering process for resilient cyber-physical systems design
TA McDermott - 2019 International Symposium on Systems …, 2019 - ieeexplore.ieee.org
System assurance is the justified confidence that a system functions as intended and is free
of exploitable vulnerabilities, either intentionally or unintentionally designed or inserted as …
of exploitable vulnerabilities, either intentionally or unintentionally designed or inserted as …
Assurance for Integrating Advanced Algorithms in Autonomous Safety-Critical Systems
M Stafford, S Bhattacharyya, M Clark… - IEEE Systems …, 2020 - ieeexplore.ieee.org
Although advanced algorithms are needed to enable increasingly autonomous civil aviation
applications, there are limitations in assurance technologies, which must be addressed to …
applications, there are limitations in assurance technologies, which must be addressed to …
Verified fault handling for modern board management controllers
Fault handling is the timely and crash-free response to critical changes in a system's
operating characteristics, such as rapid temperature increases, or electrical shorts. In a …
operating characteristics, such as rapid temperature increases, or electrical shorts. In a …
Example Applications of Formal Methods to Aerospace and Autonomous Systems
L Humphrey - 2023 IEEE International Conference on Assured …, 2023 - ieeexplore.ieee.org
As systems become more complex, they become more difficult to verify. Testing is the most
common verification approach, but testing can only cover a relatively small proportion of total …
common verification approach, but testing can only cover a relatively small proportion of total …
Designing Secure and Resilient Cyber-Physical Systems Using Formal Models
This work-in-progress paper proposes a design methodology that addresses the complexity
and heterogeneity of cyber-physical systems (CPS) while simultaneously proving resilient …
and heterogeneity of cyber-physical systems (CPS) while simultaneously proving resilient …
Formal Compositional Reasoning of Autonomous Aerial Systems with Complex Algorithms
M Stafford, S Bhattacharyya, M Clark… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Critical software systems responsible for emergency management integrate advanced
intelligent algorithms to successfully handle contingencies. These algorithms provide a …
intelligent algorithms to successfully handle contingencies. These algorithms provide a …