scholarly journals Dynamic Data Exchange in Distributed RDF Stores

2018 ◽  
Vol 30 (12) ◽  
pp. 2312-2325 ◽  
Author(s):  
Anthony Potter ◽  
Boris Motik ◽  
Yavor Nenov ◽  
Ian Horrocks
Keyword(s):  
2013 ◽  
Vol 401-403 ◽  
pp. 1935-1938
Author(s):  
Yin Juan Zhang

The network communication between MATLAB and configuration software is established using DDE(Dynamic Data Exchange) technology, which is easily to give full play to generate interactive interface in configuration software and simulation of control object model in MATLAB software. The calculation function of weakness in configuration software is repaired and the control object model and controller is to be isolated. The effective simulation platform for theory research and design of control system is established.


Micromachines ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 560
Author(s):  
Zhun Zhang ◽  
Xiang Wang ◽  
Qiang Hao ◽  
Dongdong Xu ◽  
Jinlei Zhang ◽  
...  

Dynamic data security in embedded systems is raising more and more concerns in numerous safety-critical applications. In particular, the data exchanges in embedded Systems-on-Chip (SoCs) using main memory are exposing many security vulnerabilities to external attacks, which will cause confidential information leakages and program execution failures for SoCs at key points. Therefore, this paper presents a security SoC architecture with integrating a four-parallel Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) cryptographic accelerator for achieving high-efficiency data processing to guarantee data exchange security between the SoC and main memory against bus monitoring, off-line analysis, and data tampering attacks. The architecture design has been implemented and verified on a Xilinx Virtex-5 Field Programmable Gate Array (FPGA) platform. Based on evaluation of the cryptographic accelerator in terms of performance overhead, security capability, processing efficiency, and resource consumption, experimental results show that the parallel cryptographic accelerator does not incur significant performance overhead on providing confidentiality and integrity protections for exchanged data; its average performance overhead reduces to as low as 2.65% on typical 8-KB I/D-Caches, and its data processing efficiency is around 3 times that of the pipelined AES-GCM construction. The reinforced SoC under the data tampering attacks and benchmark tests confirms the effectiveness against external physical attacks and satisfies a good trade-off between high-efficiency and hardware overhead.


Author(s):  
Anthony Potter ◽  
Boris Motik ◽  
Yavor Nenov ◽  
Ian Horrocks

Author(s):  
Xin Feng ◽  
Yue Gong ◽  
Yingying Song ◽  
Ganggang Zhang ◽  
Zhenzhen Zhang ◽  
...  

1995 ◽  
Vol 72 (12) ◽  
pp. A236
Author(s):  
Timothy L. Porter ◽  
Jim Maxka ◽  
John Abes

Sign in / Sign up

Export Citation Format

Share Document