52,363 Hits in 5.3 sec

Safeguarding Personal Data using Rights Management in Distributed Applications [chapter]

Adolf Hohl, Alf Zugenmaier
2007 IFIP International Federation for Information Processing  
First experiences from a building a demonstration application are encouraging.  ...  However, they are usually monolithic systems operating only within one database system or requiring a customized infrastructure.  ...  Additionally, this approach can be used to shift the work of ensuring the correct handling of data from the person installing and maintaining the computing environment to the software vendor for the service  ... 
doi:10.1007/978-0-387-72367-9_39 fatcat:77qna7t365c6tgbmj6eyxuzzim

New vistas on info-system security [chapter]

Willis H. Ware
1997 Information Security in Research and Business  
This discussion does not address problems that are unique to what are commonly called embedded systems; namely, computer-based systems that are an integral part of (such things as) process control and  ...  automation, of computer-based management of power grids, of flight controls in aircraft.  ...  and control, (3) possibly the quality and experience of the development vendor.  ... 
doi:10.1007/978-0-387-35259-6_15 fatcat:pdcuzvek4jazxgl4nq3capu4je

Developing System Safety Engineers for the Future

Charles Muniak
2016 Journal of System Safety  
Highlights of the 34th International System Safety Conference  ...  The 2016 ISSC took place in Orlando, Florida where, in addition to tutorials, roundtables and paper presentations (see page 45), those in attendance networked with their fellow professionals from around  ...  Investigating Process for Space Mishaps • Introduction to Data Coupling and Control Coupling • System Safety Engineering and Management: An Overview • MIL-STD-882E Applies to All Your Software -Not Just  ... 
doi:10.56094/jss.v52i2.129 fatcat:3sv5lj3555edfcegujwhp4aayy

System Safety and Artificial Intelligence [article]

Roel I.J. Dobbe
2022 arXiv   pre-print
This field embraces the core assumption of systems and control that AI systems cannot be safeguarded by technical design choices on the model or algorithm alone, instead requiring an end-to-end hazard  ...  This chapter formulates seven lessons for preventing harm in artificial intelligence (AI) systems based on insights from the field of system safety for software-based automation in safety-critical domains  ...  for crucial values like safety or privacy in AI system software an elusive goal.  ... 
arXiv:2202.09292v1 fatcat:me6dbt67yfatxhibe6xsyrcvzy

Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems

Davy Preuveneers, Wouter Joosen, Elisabeth Ilie-Zudor
2018 2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW)  
We therefore evaluate the addition of safeguards to digital twins for smart cyber-physical production systems (CPPS) in an Industry 4.0 manufacturing workflow in the form of feature toggles that are managed  ...  However, the robustness and fidelity of digital twins are a critical concern, especially when independently developed production systems and corresponding digital twins interfere with one another in a  ...  With microservices, digital twins are developed as compositions of smart data processing endpoints and dumb pipes.  ... 
doi:10.1109/edocw.2018.00021 dblp:conf/edoc/PreuveneersJZ18 fatcat:u7p4vhfo5jbb7hhmlwezbmhsle

Software Tools for the Lifecycle Support of Safety Instrumented Systems

Clive Timms
2006 Measurement and control (London. 1968)  
Since the publication of IEC 61508 (1) and IEC 61511 (2) there has been a steady increase in the number of PC based software tools developed to aid compliance.  ...  Software tools are not just the realm of the design engineer, and this paper draws on experiences to demonstrate the benefits that can be realised by SIS engineering practitioners and end users.  ...  Figure 1 -SIS Lifecycle Just like in any other form of engineering, those involved in the SIS lifecycle including development, design, installation and ongoing support need to have an appropriate set of  ... 
doi:10.1177/002029400603901004 fatcat:c5n3kmiwrnf5taf2bgzo47uhtq

On a 3D scanning robot system design problem

Olessia Ogorodnikova, Denis Olchanski
2007 Periodica Polytechnica: Mechanical Engineering  
Our purpose was to develop a fully functional, accurate, cheap and safe 3D scanning system based on a 6DOF industrial robot applications.  ...  In this given paper we present a new solution to this problem, comprising industrial robots application.  ...  data processing.  ... 
doi:10.3311/ fatcat:rifsddtuh5brznouahy63fguja

Privacy and Security Issues in Information Systems

Turn, Ware
1976 IEEE transactions on computers  
In business and industry , valuable information on new product development , marketing , finances , and ~1 anning are kep t in computer systems .  ...  A second set of safeguards would stipulate the behavior of an organization maintaining a personal data record system .  ...  AFIPS System Review Manua l on Seci~rit~, AFIPS Press , Montvale , New Jersey , 1974.  ... 
doi:10.1109/tc.1976.1674604 fatcat:suk3sgj4rvaf3do3vlytoot52i

SAFEGUARD: An assured safety net technology for UAS

Evan T. Dill, Steven D. Young, Kelly J. Hayhurst
2016 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)  
This work addresses the development of the Safeguard system as an assured safety net technology for UAS.  ...  Next, an initial prototype implementation of the described system is disclosed. Lastly, future work including development, testing, and system V&V is summarized.  ...  Work is also in progress to develop the software in compliance with NASA's software safety requirements.  ... 
doi:10.1109/dasc.2016.7778009 fatcat:vzqtj3zdyfbzpbo2lmqp6oyms4


2014 Nuclear Engineering and Technology  
In Section 4, an integrated development process is proposed for the software security of safety systems. Finally, some conclusions and future work are given in Section 5.  ...  AN INTEGRATED DEVELOPMENT PROCESS In this section, we propose a three-stage development process approach based on a security regulation analysis.  ... 
doi:10.5516/net.04.2012.061 fatcat:kv5us4h2qngrtoynhga4sgf5nq

Safeguarding SCADA Systems with Anomaly Detection [chapter]

John Bigham, David Gamez, Ning Lu
2003 Lecture Notes in Computer Science  
Although the methods outlined in this paper are illustrated using the data from an electricity network, this research springs from a more general attempt to improve the security and dependability of SCADA  ...  systems using anomaly detection.  ...  Acknowledgements We would like to acknowledge Xuan Jin and the other members of the Safeguard project.  ... 
doi:10.1007/978-3-540-45215-7_14 fatcat:4ahsxtnq2jcozjf6aj6ozbyfk4

Lessons Learned from Soft Computing Applications at SCK-CEN

Da Ruan
2010 International Journal of Computational Intelligence Systems  
in practice.  ...  We draw lessons learned from the examined projects including reactor control, cost estimation, energy policy, and nuclear safeguards.  ...  nuclear safeguards evaluation process.  ... 
doi:10.2991/ijcis.2010.3.2.12 fatcat:wkr42ch52bgpvat3kti5lmznqi

From Peer Production to Productization: A Study of Socially Enabled Business Exchanges in Open Source Service Networks

Joseph Feller, Patrick Finnegan, Brian Fitzgerald, Jeremy Hayes
2008 Information systems research  
However, community-based development often falls short of creating software "products" in the sense that consumers understand.  ...  The paper reveals the manifestation of social mechanisms in OSSNs and how these are used for coordinating and safeguarding exchanges between firms.  ...  Acknowledgments This work has been financially supported by the Irish Research Council for the Humanities and Social Sciences (IRCHSS), the Science Foundation Ireland (SFI) award to Lero-the Irish Software  ... 
doi:10.1287/isre.1080.0207 fatcat:z3dmjp5ztnbrndrhfv7s2qh7f4

"Seis" — security in embedded IP-based systems

Michael Glass, Daniel Herrscher, Herbert Meier, Martin, Peter Schoo
2010 ATZelektronik worldwide  
For this reason the innovation alliance for automobile electronics E|ENOVA initiated the research project "SEIS -Safety in Embedded IP-based Systems", with the aim of creating a consistent security solution  ...  The constantly increasing variety of networking technologies used in automobiles today results in complex and cost-intensive E/E architectures.  ...  The actual objective of the Systems Software subproject is the development of IP based vehicle middleware for interdomain applications.  ... 
doi:10.1007/bf03242255 fatcat:3s4vcboyqbaafkps5v5lgm55ii

Impenetrable Security System Using Embedded Softwares

Bhaskar. S et al., Bhaskar. S et al.,, TJPRC
2019 International Journal of Electronics Communication & Instrumentation Engineering Research and Development  
Self-security also plays a vital role in this highly developing technological era, where authorization and ownership of lockers, banking and others must be secured.  ...  With the advent of digitalization, every consumer based services use computers and software as one of their basic requirement for efficient functioning.  ...  This circuit isn't designed for a security system in an exceedingly industrial application; however that ought to not forestall anyone from experimenting with it for that purpose.  ... 
doi:10.24247/ijecierddec20193 fatcat:ywr4ycah25fxbkpandi2ussxca
« Previous Showing results 1 — 15 out of 52,363 results