Visual Assessment Techniques for Component-Based Framework Evolution
EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Managing Trustworthiness in Component-based Embedded Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Bridging disjoint trusted domains into a trustworthy system
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Component engineering for adaptive ad-hoc systems
Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems
On runtime service quality models in adaptive ad-hoc systems
Proceedings of the 2009 ESEC/FSE workshop on Software integration and evolution @ runtime
Approaching runtime trust assurance in open adaptive systems
Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
Autonomic trust management in a component based software system
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Security model oriented attestation on dynamically reconfigurable component-based systems
Journal of Network and Computer Applications
A component framework for consumer electronics middleware
Component-Based Software Development for Embedded Systems
Conditional Safety Certification of Open Adaptive Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
There is a need for mechanisms for maintaining and restoring software integrity on deployed systems. Dynamic replacement, removal and addition of components in deployed systems is supported by most component models. This is needed to enable the software on a device to evolve in the period that it is owned by a consumer, but endangers the integrity of the software on these devices. For high volume consumer devices the challenge is to keep the devices operating reliable and robust in the period that it is owned, used and possibly reconfigured by a consumer. To this end, we propose mechanisms and tools, for maintaining system integrity on deployed systems.