Anais do I Brazilian Workshop on Large-scale Critical Systems (BWare 2019)

2019 ◽  
Keyword(s):  
i-com ◽  
2016 ◽  
Vol 15 (3) ◽  
Author(s):  
Tilo Mentler ◽  
Christian Reuter ◽  
Stefan Geisler

AbstractMission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.


Author(s):  
Rania Salih Ahmed ◽  
Elmustafa Sayed Ali Ahmed ◽  
Rashid A. Saeed

Cyber-physical systems (CPS) have emerged with development of most great applications in the modern world due to their ability to integrate computation, networking, and physical process. CPS and ML applications are widely used in Industry 4.0, military, robotics, and physical security. Development of ML techniques in CPS is strongly linked according to the definition of CPS that states CPS is the mechanism of monitoring and controlling processes using computer-based algorithms. Optimizations adopted with ML in CPS include domain adaptation and fine tuning of current systems, boosting, introducing more safety and robustness by detection and reduction of vulnerabilities, and reducing computation time in time-critical systems. Generally, ML helps CPS to learn and adapt using intelligent models that are generated from training of large-scale data after processing and analysis.


Information ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 309
Author(s):  
Peng Wu ◽  
Ning Xiong ◽  
Juxia Xiong ◽  
Jinzhao Wu

Error coefficients are ubiquitous in systems. In particular, errors in reasoning verification must be considered regarding safety-critical systems. We present a reasoning method that can be applied to systems described by the polynomial error assertion (PEA). The implication relationship between PEAs can be converted to an inclusion relationship between zero sets of PEAs; the PEAs are then transformed into first-order polynomial logic. Combined with the quantifier elimination method, based on cylindrical algebraic decomposition, the judgment of the inclusion relationship between zero sets of PEAs is transformed into judgment error parameters and specific error coefficient constraints, which can be obtained by the quantifier elimination method. The proposed reasoning method is validated by proving the related theorems. An example of intercepting target objects is provided, and the correctness of our method is tested through large-scale random cases. Compared with reasoning methods without error semantics, our reasoning method has the advantage of being able to deal with error parameters.


The current requirements of software are intensively based on load sharing, on-demand services, cascading requirements, redundancy for reliability and executing on heterogeneous environments. It needs precise architectural details for development of such software systems. These are large scale software systems with complex interactions amongst the constituent components. Testing for performance and conformance to quality requires perspective modeling fordesigning critical systems. The analysis of these systems is focused on dynamic or execution time behavior for achieving quality. In the same context, this paper redefines Functional Flow Specification for dynamic analysis of critical and collaborating systems. Functional Flow based modeling is a mature concept in the domain of system engineering but is rarely applicable to software systems. Functional Flow Block Reliability Diagram (FFBRD) is a notation for abstract view of the system evolution and interactions. This adopts the specification format of UML and system modeling conventions of SysML specially Enhanced Functional Flow Block Diagram (EFFBD). The flow of data and control are so designed that it best suits the approaches for quality analysis like system reliability. The method proposed is System Reliability with UML or SR-UML for generating test through FFBRD. It also caters to the need of designing software in a familiar formalization for extending, translating and simulating with existing algorithms. From the results collected through various scenarios, we can conclude that SR-UML is instrumental in process improvement of current software development methods


2014 ◽  
Author(s):  
Rodrick Wallace

The Data Rate Theorem that establishes a formal linkage between linear control theory and information theory carries deep implications for the design of biologically inspired cognitive architectures (BICA), and for the more general study of embodied cognition. For example, modest extensions of the theorem provide a spectrum of necessary conditions dynamic statistical models that will be useful in empirical studies. A large deviations argument, however, suggests that the stabilization of such systems is itself an interpenetrating dynamic process necessarily convoluted with embodied cognition. As our experience with mental disorders and chronic disease implies, evolutionary process has had only modest success in the regulation and control of cognitive biological phenomena. For humans, the central role of culture has long been known. Although a ground-state collapse analogous to generalized anxiety appears ubiquitous to such systems, lack of cultural modulation for real-time automatons or distributed cognition man-machine `cockpits' makes them particularly subject to a canonical pathology under which `all possible targets are enemies'. More general dysfunctions of large-scale topology and connectivity analogous to autism spectrum and schizophenoform disorders also appear likely. A kind of machine psychiatry may become a central engineering discipline as the number of computation cores in real-time critical systems increases exponentially over the next few decades.


2020 ◽  
Vol 17 (5) ◽  
pp. 808-815
Author(s):  
Faouzi Jaidi ◽  
Faten Ayachi ◽  
Adel Bouhoula

Databases are considered as one of the most compromised assets according to 2014-2016 Verizon Data Breach Reports. The reason is that databases are at the heart of Information Systems (IS) and store confidential business or private records. Ensuring the integrity of sensitive records is highly required and even vital in critical systems (e-health, clouds, e-government, big data, e-commerce, etc.,). The access control is a key mechanism for ensuring the integrity and preserving the privacy in large scale and critical infrastructures. Nonetheless, excessive, unused and abused access privileges are identified as most critical threats in the top ten database security threats according to 2013-2015 Imperva Application Defense Center reports. To address this issue, we focus in this paper on the analysis of the integrity of access control policies within relational databases. We propose a rigorous and complete solution to help security architects verifying the correspondence between the security planning and its concrete implementation. We define a formal framework for detecting non-compliance anomalies in concrete Role Based Access Control (RBAC) policies. We rely on an example to illustrate the relevance of our contribution


2015 ◽  
Vol 28 (2) ◽  
pp. 400-419 ◽  
Author(s):  
Massimo Ficco ◽  
Giovanni Avolio ◽  
Francesco Palmieri ◽  
Aniello Castiglione
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document