{"id":"https://openalex.org/W2783105925","doi":"https://doi.org/10.1109/iske.2017.8258789","title":"Modeling and validation for embedded software confidentiality and integrity","display_name":"Modeling and validation for embedded software confidentiality and integrity","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2783105925","doi":"https://doi.org/10.1109/iske.2017.8258789","mag":"2783105925"},"language":"en","primary_location":{"id":"doi:10.1109/iske.2017.8258789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske.2017.8258789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107247543","display_name":"Xinwen Hu","orcid":"https://orcid.org/0000-0001-9566-5424"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinwen Hu","raw_affiliation_strings":["The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068220355","display_name":"Yi Zhuang","orcid":"https://orcid.org/0000-0003-0706-0148"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zhuang","raw_affiliation_strings":["The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017248361","display_name":"Zining Cao","orcid":"https://orcid.org/0000-0002-4673-200X"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zining Cao","raw_affiliation_strings":["The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101446238","display_name":"Tong Ye","orcid":"https://orcid.org/0000-0003-3812-3105"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Ye","raw_affiliation_strings":["The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100453887","display_name":"Mi Li","orcid":"https://orcid.org/0000-0002-4886-2430"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mi Li","raw_affiliation_strings":["The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5107247543"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64729414,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7888144254684448},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.532666802406311},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.5293505787849426},{"id":"https://openalex.org/keywords/embedded-software","display_name":"Embedded software","score":0.47379228472709656},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.4519663453102112},{"id":"https://openalex.org/keywords/applications-of-uml","display_name":"Applications of UML","score":0.41365155577659607},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.410614550113678},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4009513854980469},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3541337549686432},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32164353132247925},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.315132200717926}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7888144254684448},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.532666802406311},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.5293505787849426},{"id":"https://openalex.org/C154488198","wikidata":"https://www.wikidata.org/wiki/Q1335007","display_name":"Embedded software","level":3,"score":0.47379228472709656},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.4519663453102112},{"id":"https://openalex.org/C41298492","wikidata":"https://www.wikidata.org/wiki/Q4781506","display_name":"Applications of UML","level":4,"score":0.41365155577659607},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.410614550113678},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4009513854980469},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3541337549686432},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32164353132247925},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.315132200717926}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iske.2017.8258789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske.2017.8258789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1964376691","https://openalex.org/W2007999111","https://openalex.org/W2036019691","https://openalex.org/W2134296086","https://openalex.org/W2144973245","https://openalex.org/W2162022335","https://openalex.org/W2263214918","https://openalex.org/W2538443008","https://openalex.org/W2612271537"],"related_works":["https://openalex.org/W2083641877","https://openalex.org/W2387087283","https://openalex.org/W2368891820","https://openalex.org/W207211690","https://openalex.org/W4256577339","https://openalex.org/W3119629122","https://openalex.org/W1971046215","https://openalex.org/W2162768729","https://openalex.org/W1553991707","https://openalex.org/W2073951592"],"abstract_inverted_index":{"With":[0],"the":[1,21,24,38,46,55,63,67,84,91,107,114,122,125,128,135,143,147,154,177,196,200,207,212,221,224],"rapid":[2],"development":[3],"of":[4,28,40,58,70,86,95,106,110,116,127,162,181,214,223],"embedded":[5,7,29,41,59,71,144,163,218,225],"software,":[6,30,60,72,219],"software":[8,42,145,164,226],"has":[9],"a":[10,215],"highly":[11],"security":[12,43,56,68,149,227],"demand,":[13],"such":[14],"as":[15],"confidentiality":[16,129,165],"and":[17,26,82,88,130,158,166,174,192,220],"integrity.":[18],"UML":[19,96,182],"provides":[20],"foundation":[22],"for":[23,37,66],"construction":[25],"analysis":[27],"but":[31],"it":[32],"cannot":[33],"provide":[34,62],"accurate":[35],"semantics":[36,65],"validation":[39],"properties.":[44],"Using":[45],"formal":[47,136,201],"method":[48],"based":[49,169,194],"on":[50,170,195],"Z":[51,99,111,171,186],"language":[52],"to":[53,76,98,185],"model":[54,92,97,132,157,161,178,202,228],"properties":[57,69],"can":[61,74,102,141],"rigorous":[64],"which":[73,101,140,189],"help":[75],"discover":[77],"its":[78],"early":[79],"design":[80],"errors":[81],"reduce":[83,113],"cost":[85],"testing":[87],"maintenance.":[89],"Developing":[90],"transformation":[93,179],"tool":[94,138,209],"model,":[100,112],"avoid":[103],"repetitive":[104],"modeling":[105,168,183,187],"manual":[108],"establishment":[109],"possibility":[115],"introducing":[117],"artificial":[118],"logic":[119],"error":[120],"in":[121,230],"model.":[123],"Verifying":[124],"correctness":[126,222],"integrity":[131,167],"by":[133,205],"using":[134,206],"verification":[137,208],"Z/EVES,":[139],"make":[142],"satisfy":[146],"user's":[148],"requirement.":[150],"This":[151],"paper":[152,232],"construct":[153],"static":[155],"structure":[156],"dynamic":[159],"behavior":[160],"at":[172],"first;":[173],"then":[175],"establish":[176],"rules":[180],"elements":[184],"elements,":[188],"is":[190,203,233],"designed":[191],"implemented":[193],"XSLT":[197],"technology;":[198],"finally,":[199],"validated":[204],"Z/EVES":[210],"through":[211],"example":[213],"bicycle":[216],"parking":[217],"presented":[229],"this":[231],"explained.":[234]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
