Team for Research in
Ubiquitous Secure Technology

Modeling Security Aspects in Embedded Systems
Matthew Eby, Jan Werner, Janos Laszlo Mathe, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue

Citation
Matthew Eby, Jan Werner, Janos Laszlo Mathe, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue. "Modeling Security Aspects in Embedded Systems". Talk or presentation, January, 2006; Poster presented at the TRUST Review Meeting.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Matthew Eby, Jan Werner, Janos Laszlo Mathe, Gabor Karsai,
    Sandeep Neema, Janos Sztipanovits, Yuan Xue. <a
    href="http://www.truststc.org/pubs/533.html"
    ><i>Modeling Security Aspects in Embedded
    Systems</i></a>, Talk or presentation,  January,
    2006; Poster presented at the TRUST Review Meeting.
  • Plain text
    Matthew Eby, Jan Werner, Janos Laszlo Mathe, Gabor Karsai,
    Sandeep Neema, Janos Sztipanovits, Yuan Xue. "Modeling
    Security Aspects in Embedded Systems". Talk or
    presentation,  January, 2006; Poster presented at the TRUST
    Review Meeting.
  • BibTeX
    @presentation{EbyWernerMatheKarsaiNeemaSztipanovitsXue06_ModelingSecurityAspectsInEmbeddedSystems,
        author = {Matthew Eby and Jan Werner and Janos Laszlo Mathe
                  and Gabor Karsai and Sandeep Neema and Janos
                  Sztipanovits and Yuan Xue},
        title = {Modeling Security Aspects in Embedded Systems},
        month = {January},
        year = {2006},
        note = {Poster presented at the TRUST Review Meeting},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/533.html}
    }
    

Posted by Janos Laszlo Mathe on 5 Feb 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.