Team for Research in
Ubiquitous Secure Technology

Composing Security Modeling Concepts into Embedded System Models
Jan Werner, Matthew Eby, Janos Laszlo Mathe, Gabor Karsai, Akos Ledeczi, Janos Sztipanovits

Citation
Jan Werner, Matthew Eby, Janos Laszlo Mathe, Gabor Karsai, Akos Ledeczi, Janos Sztipanovits. "Composing Security Modeling Concepts into Embedded System Models". Talk or presentation, March, 2007; Poster presented at the TRUST Review Meeting.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Jan Werner, Matthew Eby, Janos Laszlo Mathe, Gabor Karsai,
    Akos Ledeczi, Janos Sztipanovits. <a
    href="http://www.truststc.org/pubs/536.html"
    ><i>Composing Security Modeling Concepts into
    Embedded System Models</i></a>, Talk or
    presentation,  March, 2007; Poster presented at the TRUST
    Review Meeting.
  • Plain text
    Jan Werner, Matthew Eby, Janos Laszlo Mathe, Gabor Karsai,
    Akos Ledeczi, Janos Sztipanovits. "Composing Security
    Modeling Concepts into Embedded System Models". Talk or
    presentation,  March, 2007; Poster presented at the TRUST
    Review Meeting.
  • BibTeX
    @presentation{WernerEbyMatheKarsaiLedecziSztipanovits07_ComposingSecurityModelingConceptsIntoEmbeddedSystemModels,
        author = {Jan Werner and Matthew Eby and Janos Laszlo Mathe
                  and Gabor Karsai and Akos Ledeczi and Janos
                  Sztipanovits},
        title = {Composing Security Modeling Concepts into Embedded
                  System Models},
        month = {March},
        year = {2007},
        note = {Poster presented at the TRUST Review Meeting},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/536.html}
    }
    

Posted by Janos Laszlo Mathe on 5 Feb 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.