Skip to content

Commit

Permalink
An other push
Browse files Browse the repository at this point in the history
Signed-off-by: Paul Wortman <paul.mauddib28@gmail.com>
  • Loading branch information
paw10003 committed Jul 9, 2015
1 parent c9ca7fc commit f56d5fe
Showing 1 changed file with 1 addition and 4 deletions.
5 changes: 1 addition & 4 deletions PBDSecPaper.tex
Original file line number Diff line number Diff line change
Expand Up @@ -79,10 +79,7 @@

\begin{abstract}
\begin{itemize}
\item PBD centers around minimizing costs of developing and manufacturering new components along with changing the landscape of this ecosystem, through the use of a ``meet-in-the-middle'' methodology where successive refinements of specificiations meet with abstractions of pototential implemenetations.
\begin{itemize}
\item The goal being to obtain the same level of abstraction as is writtien into good coding functions.~\cite{Vincentelli2002}
\end{itemize}
\item PBD centers around minimizing costs of developing and manufacturering new components along with changing the landscape of this ecosystem, through the use of a ``meet-in-the-middle'' methodology where successive refinements of specificiations meet with abstractions of pototential implemenetations; the goal being to obtain the same level of abstraction as is writtien into good coding functions.~\cite{Vincentelli2002}
\item Security centers around being able to gauge the trustworthiness of components as well as the larger system made of distributed components.
\item Lack of design/methodology for doing platform-based design of security elements, although conceptual use in mobile embedded systems. \textbf{[Add citation(s) here]}
\item Ground work for implementing security via PBD exists; this paper is centered around connecting the dots and laying the foundation for framework that will be built upon for creating security in a doucmented, rigorous, standardized way.
Expand Down

0 comments on commit f56d5fe

Please sign in to comment.