2Xie T,Qin X.Improving Security for Periodic Tasks in Embedded Systems Through Scheduling[J].ACM Trans on Embedded Computing System,2007,6(3):20-34.
3Xie T,Qin X.A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Cluster[C] ∥Proc of the 7th IEEE Int'l Conf on Cluster Computing,2005:1-10.
4Lin M,Yang L T,Qin X,et al.Static Security Optimization for Real-Time Systems[J].IEEE Trans on Industrial Informatics,2009,5(1):22-37.
5Ravi S,Rage A,Kocher P C,et al.Security in Embedded Systems:Design Challenges[J].ACM Trans on Embedded Computing System,2004,3(3):461-491.
6Menezes A J,Scott V O,Vanstone A.Handbook of Applied Cryptography[M].CRC Press,1996.
7Eames D P,Moffett J D.The Integration of Safety and Security Requirements[C] ∥Proc of SAFECOMP'99,1999:468-480.
8Aloul F,Ramani A,Markov I.Generic ILP Versus Specialized 0-1 ILP:An Update[C] ∥Proc of Int'l Conf on Computer Aided Design,2002:450-457.