Updated releases of HCUP comorbidity software and clinical classifications software updates are available

Keyword(s):  
Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4393
Author(s):  
JongHyup Lee ◽  
Taekyoung Kwon

The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpose, we bind every entity with a unique identity in the blockchain and employ the blockchain as a delegated authenticator by mapping every reporting action to a non-fungible token transfer. Moreover, we present a detailed specification to clearly define the behavior of systems and to apply model checking.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1220
Author(s):  
Chee Wei Lee ◽  
Stuart Madnick

Urban mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, and Internet-connected and self-driving vehicles. Technological advancements often lead to new hazards. Coupled with the increased levels of automation and connectivity in the new generation of autonomous vehicles, cybersecurity is emerging as a key threat affecting these vehicles. Traditional hazard analysis methods treat safety and security in isolation and are limited in their ability to account for interactions among organizational, sociotechnical, human, and technical components. In response to these challenges, the cybersafety method, based on System Theoretic Process Analysis (STPA and STPA-Sec), was developed to meet the growing need to holistically analyze complex sociotechnical systems. We applied cybersafety to coanalyze safety and security hazards, as well as identify mitigation requirements. The results were compared with another promising method known as Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS). Both methods were applied to the Mobility-as-a-Service (MaaS) and Internet of Vehicles (IoV) use cases, focusing on over-the-air software updates feature. Overall, cybersafety identified additional hazards and more effective requirements compared to CHASSIS. In particular, cybersafety demonstrated the ability to identify hazards due to unsafe/unsecure interactions among sociotechnical components. This research also suggested using CHASSIS methods for information lifecycle analysis to complement and generate additional considerations for cybersafety. Finally, results from both methods were backtested against a past cyber hack on a vehicular system, and we found that recommendations from cybersafety were likely to mitigate the risks of the incident.


Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 739
Author(s):  
Nicholas Ayres ◽  
Lipika Deka ◽  
Daniel Paluszczyszyn

The vehicle-embedded system also known as the electronic control unit (ECU) has transformed the humble motorcar, making it more efficient, environmentally friendly, and safer, but has led to a system which is highly dependent on software. As new technologies and features are included with each new vehicle model, the increased reliance on software will no doubt continue. It is an undeniable fact that all software contains bugs, errors, and potential vulnerabilities, which when discovered must be addressed in a timely manner, primarily through patching and updates, to preserve vehicle and occupant safety and integrity. However, current automotive software updating practices are ad hoc at best and often follow the same inefficient fix mechanisms associated with a physical component failure of return or recall. Increasing vehicle connectivity heralds the potential for over the air (OtA) software updates, but rigid ECU hardware design does not often facilitate or enable OtA updating. To address the associated issues regarding automotive ECU-based software updates, a new approach in how automotive software is deployed to the ECU is required. This paper presents how lightweight virtualisation technologies known as containers can promote efficient automotive ECU software updates. ECU functional software can be deployed to a container built from an associated image. Container images promote efficiency in download size and times through layer sharing, similar to ECU difference or delta flashing. Through containers, connectivity and OtA future software updates can be completed without inconveniences to the consumer or incurring expense to the manufacturer.


2013 ◽  
Vol 59 (2) ◽  
pp. 435-441 ◽  
Author(s):  
Milosh Stolikj ◽  
Pieter Cuijpers ◽  
Johan Lukkien
Keyword(s):  

2021 ◽  
Vol 113 (8) ◽  
pp. 8-16
Author(s):  
Will Jernigan ◽  
David Sayers
Keyword(s):  

Author(s):  
Petr Zach ◽  
Martin Pokorný ◽  
Jiří Balej ◽  
Michal Šturma

A management of computer classroom is undoubtedly a difficult task for the administrator which has to prepare virtual operating systems for education. It is quite common that lectors need to edit the particular machine during the semester, and that is the case where the main problems can appear. The process of changes deployment is not just very time-consuming but during it a virtual machine inconsistency can appear. The main part of this paper focuses on system process diagrams and its pseudocode. At first, the machine is created on the remote server by lector or administrator. After a proper approval, the machine is able to be deployed. The lector then specifies the details about date, time and destinations of the virtual machine deployment. Once these details are approved, the virtual machine will be automatically deployed at the specified time. The automatic deployment includes also an initial configuration of the virtual machine at remote desktop and its post-install configuration (hostname, MAC address, etc.). Once all steps are completed, the process will be marked as succeed. We present an automatized solution which provides a possibility how to easily manage computer classroom with virtual operating systems. The proposed solution should deliver a greater flexibility, more reliability and faster deployment in comparison with the current solution used in our computer classroom. The proposal is also able to manipulate with already deployed machines for easy changes (e.g. software updates). The main advantage is the improvement of classroom management process automation.


Sign in / Sign up

Export Citation Format

Share Document