Filters








254,805 Hits in 6.1 sec

Delinking Investment in Antibiotic Research and Development from Sales Revenues: The Challenges of Transforming a Promising Idea into Reality

Kevin Outterson, Unni Gopinathan, Charles Clift, Anthony So, Chantal Morel, John-Arne RRttingen
2016 Social Science Research Network  
To enable global access, a delinked incentive framework must also address the management of intellectual property (IP).  ...  , including defining the eligibility criteria for delinkage rewards and appropriate management of intellectual property. 4.  ...  Author Contributions Wrote the first draft of the manuscript: UG. Contributed to the writing of the manuscript: KO UG CC AS CMM JAR.  ... 
doi:10.2139/ssrn.2795774 fatcat:hx72wbj6qncnvfukbaa7g3thde

Delinking Investment in Antibiotic Research and Development from Sales Revenues: The Challenges of Transforming a Promising Idea into Reality

Kevin Outterson, Unni Gopinathan, Charles Clift, Anthony D. So, Chantal M. Morel, John-Arne Røttingen
2016 PLoS Medicine  
To enable global access, a delinked incentive framework must also address the management of intellectual property (IP).  ...  The idea of establishing a new business model to drive antibiotic development and improve conservation currently has the world's attention.  ... 
doi:10.1371/journal.pmed.1002043 pmid:27299990 pmcid:PMC4907461 fatcat:qh4nwtqqzndc5n6jzgfinmqmoq

Regionalism under Challenge: Ideas and Joko Widodo's Foreign Policy towards ASEAN, 2014-2019

Mohamad Rosyidin, Shary Charlotte H. Pattipeilohy
2020 Journal of Asean Studies  
The research investigates the causal root of the tendency by using the concept of ideas in foreign policy.  ...  The results argue that the diminished role of Indonesia in ASEAN, especially during the first term of Jokowi's presidency, is strongly influenced by causal beliefs held by Indonesian political elites and  ...  For Indonesia, ASEAN's most significant challenges are security and the economy.  ... 
doi:10.21512/jas.v8i2.6596 fatcat:yksar2qhm5fibc3mdjxu6fae7q

High Assurance Software Systems

I.-R. Chen
2006 Computer journal  
The goal of the special issue is to bring together innovative research ideas and advances in the field of high assurance software systems to address these challenges.  ...  PSIM is shown to be effective in predicting system performance and identifying system performance bottlenecks to address the timeliness property of high assurance software systems early in the development  ...  The goal of the special issue is to bring together innovative research ideas and advances in the field of high assurance software systems to address these challenges.  ... 
doi:10.1093/comjnl/bxl040 fatcat:3xhe2hkp55bgppk533kfppsdbe

Safety-Critical Systems: The Next Generation

Robin Bloomfield, Jay Lala
2013 IEEE Security and Privacy  
Safety and Security Apart from the fact that safety-critical systems is an important topic in its own right, IEEE Security & Privacy is addressing these issues for two other reasons.  ...  consider any computer-based safety system to be truly safe unless we also address its security.  ...  Acknowledgments We thank all those who submitted articles to this special issue and the external reviewers for their multiple rounds of thorough reviews, comments, and suggestions.  ... 
doi:10.1109/msp.2013.95 fatcat:42nryxwkmfgwnbpbogfo5xutym

Extending a Multi-Agent Systems Simulation Architecture for Systems-of-Systems Security Analysis

Jamal El Hachem, Vanea Chiprianov, Valdemar Vicente Graciano Neto, Philippe Aniorte
2018 2018 13th Annual Conference on System of Systems Engineering (SoSE)  
The aim of this study is to address the SoS analysis challenge while considering SoS emergent behavior, CSs managerial and operational independence and security properties.  ...  CONCLUSION In this paper we addressed the SoS security analysis challenge, mainly the cascading attack security issue which has a high impact in the context of SoS.  ... 
doi:10.1109/sysose.2018.8428776 dblp:conf/sysose/HachemCNA18 fatcat:itll2eev7zhiffphdi6zybnhti

Assessing Security Risk and Requirements for Systems of Systems

Duncan Ki-Aries
2018 2018 IEEE 26th International Requirements Engineering Conference (RE)  
security risk and requirements in an interconnected SoS.  ...  risks with use of a tool-support for assessing security risk in the SoS context.  ...  and address challenges to security risk and requirements within the SoS.  ... 
doi:10.1109/re.2018.00061 dblp:conf/re/Ki-Aries18 fatcat:muxfzgtf7bgopkvf3ujlq3gxua

On using blockchains for safety-critical systems

Christian Berger, Birgit Penzenstadler, Olaf Drögehorn
2018 Proceedings of the 4th International Workshop on Software Engineering for Smart Cyber-Physical Systems - SEsCPS '18  
This paper analyzes the state-of-the-art for safety-critical systems as found in modern vehicles like self-driving cars, smart energy systems, and home automation focusing on specific challenges where  ...  Next, potential benefits unlocked by applying such ideas are presented and discussed for the respective usage scenario.  ...  CONCLUSION In this work, we analyzed challenges for safety-critical embedded and cyber-physical systems to address the research question, which of these challenges could be overcome when adopting key ideas  ... 
doi:10.1145/3196478.3196480 dblp:conf/icse/BergerPD18 fatcat:mdokhqdkcfap3hfxpq5hs2ap4e

Software engineering for secure systems

Danilo Bruschi, Bart De Win, Mattia Monga
2006 Proceeding of the 28th international conference on Software engineering - ICSE '06  
The second session tackled the problem of evaluating trust, risk, and security properties from high level descriptions of a system. Lee et~al.  ...  Speaker presentations were organized in three sessions. The first session addressed security at the architectural level of applications. Demir et~al.  ... 
doi:10.1145/1134285.1134476 dblp:conf/icse/BruschiWM06 fatcat:j4qxcprn4nh65n2o6s7v7zu27q

Software engineering for secure systems

Danilo Bruschi, Bart De Win, Mattia Monga
2005 Proceedings of the 27th international conference on Software engineering - ICSE '05  
The second session tackled the problem of evaluating trust, risk, and security properties from high level descriptions of a system. Lee et~al.  ...  Speaker presentations were organized in three sessions. The first session addressed security at the architectural level of applications. Demir et~al.  ... 
doi:10.1145/1062455.1062607 dblp:conf/icse/BruschiWM05 fatcat:ohw63pxzazgnxdvrxilhqmvcla

Software engineering for secure systems

Danilo Bruschi, Bart De Win, Mattia Monga
2005 Software engineering notes  
The second session tackled the problem of evaluating trust, risk, and security properties from high level descriptions of a system. Lee et~al.  ...  Speaker presentations were organized in three sessions. The first session addressed security at the architectural level of applications. Demir et~al.  ... 
doi:10.1145/1082983.1082996 fatcat:alpu4l32jjfefgu4cbzvrrllvy

Verifying next generation electronic systems

Rolf Drechsler, Daniel Grose
2017 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS)  
In this paper the state-of-theart on verification is reported. Furthermore, recent developments are listed and finally the most pressing challenges for industry and academia are identified. I.  ...  The application domains of electronic systems range from consumer devices to safety-critical systems. Of course, for systems of the latter areas a thorough verification is required.  ...  Consequently, one can focus on addressing the first two challenges to increase the scalability and efficiency of the back-end in handling large state spaces.  ... 
doi:10.1109/ictus.2017.8285965 fatcat:ajyzto3v7vhqbnr2xmqakmmzb4

Identifying top challenges for international research on requirements engineering for systems of systems engineering

Cornelius Ncube, Soo Ling Lim, Huseyin Dogan
2013 2013 21st IEEE International Requirements Engineering Conference (RE)  
This panel explores key RE challenges in Systems of Systems Engineering, specifically, the areas in which the international RE community need to focus its research, and the approaches that are most likely  ...  However, as is evident from publications in major Requirements Engineering conferences and journals, no significant effort has been expedited towards addressing specific RE issues for Systems of Systems  ...  ACKNOWLEDGMENT We thank all panellists and participants for their valuable contribution.  ... 
doi:10.1109/re.2013.6636746 dblp:conf/re/NcubeLD13 fatcat:5h2uuegqabgqdkkcpju5euogt4

Systems-of-Systems Issues in Security Engineering

Jennifer L. Bayuk
2011 Insight  
Conclusions The implementation of the high-level security requirements deriving from data policies is critical to gaining participation of systems in an SoS by reassuring systems managers and owners about  ...  The approach also includes the injection of these high-level security requirements in the definition of the SoS's functional architecture.  ...  The idea is to challenge the assumption that anyone can in advance create a list of technology-control measures that will apply to every project, even all projects in a given domain.  ... 
doi:10.1002/inst.201114222 fatcat:d6vazwwhtfbpdgek23wzikcioq

On Systems of Systems Engineering: A Requirements Engineering Perspective and Research Agenda

Cornelius Ncube, Soo Ling Lim
2018 2018 IEEE 26th International Requirements Engineering Conference (RE)  
In this paper, we firstly introduce SoSE as an emerging discipline and key characteristics of SoSs. We then highlight the challenges that the RE discipline must respond to.  ...  for addressing requirements engineering complexities posed by Systems of Systems.  ...  Brief Summary We have highlighted some key weaknesses in current requirements engineering approaches in addressing the challenges posed by SoSE and Systems of Systems.  ... 
doi:10.1109/re.2018.00021 dblp:conf/re/NcubeL18 fatcat:oxqlczi3jffqfoupw3gowzfo24
« Previous Showing results 1 — 15 out of 254,805 results