RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2011 Issue 19, Pages 221–242 (Mi trspy465)

Configuring embedded and mobile devices on the basis of solving an optimization problem

V. Desnitsky

St. Petersburg Institute for Informatics and Automation of RAS

Abstract: The paper encompasses design and analysis of combined protection mechanisms applied to complex communication systems containing embedded and mobile devices. A notion of configuration is proposed in order to represent a combination of particular security building blocks deployed to support security of the device as well as software services it provides. Starting from functional and non-functional properties of specific building blocks the optimization problem allows arranging the search of the most effective configuration. Effectiveness evaluation of the configuring approach is conducted by means of its comparing with alternative configuring strategies, including “manual” configuring scenarios realized by an operator of the system without using any automated tools for enumeration and evaluation of configurations.

Keywords: configuration, embedded device, mobile device, security building block.

UDC: 004.75

Received: 11.11.2011
Accepted: 29.11.2011



© Steklov Math. Inst. of RAS, 2026