A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Safeguarding Personal Data using Rights Management in Distributed Applications
[chapter]
2007
IFIP International Federation for Information Processing
First experiences from a building a demonstration application are encouraging. ...
However, they are usually monolithic systems operating only within one database system or requiring a customized infrastructure. ...
Additionally, this approach can be used to shift the work of ensuring the correct handling of data from the person installing and maintaining the computing environment to the software vendor for the service ...
doi:10.1007/978-0-387-72367-9_39
fatcat:77qna7t365c6tgbmj6eyxuzzim
New vistas on info-system security
[chapter]
1997
Information Security in Research and Business
This discussion does not address problems that are unique to what are commonly called embedded systems; namely, computer-based systems that are an integral part of (such things as) process control and ...
automation, of computer-based management of power grids, of flight controls in aircraft. ...
and control, (3) possibly the quality and experience of the development vendor. ...
doi:10.1007/978-0-387-35259-6_15
fatcat:pdcuzvek4jazxgl4nq3capu4je
Developing System Safety Engineers for the Future
2016
Journal of System Safety
Highlights of the 34th International System Safety Conference ...
The 2016 ISSC took place in Orlando, Florida where, in addition to tutorials, roundtables and paper presentations (see page 45), those in attendance networked with their fellow professionals from around ...
Investigating Process for Space Mishaps • Introduction to Data Coupling and Control Coupling • System Safety Engineering and Management: An Overview • MIL-STD-882E Applies to All Your Software -Not Just ...
doi:10.56094/jss.v52i2.129
fatcat:3sv5lj3555edfcegujwhp4aayy
System Safety and Artificial Intelligence
[article]
2022
arXiv
pre-print
This field embraces the core assumption of systems and control that AI systems cannot be safeguarded by technical design choices on the model or algorithm alone, instead requiring an end-to-end hazard ...
This chapter formulates seven lessons for preventing harm in artificial intelligence (AI) systems based on insights from the field of system safety for software-based automation in safety-critical domains ...
for crucial values like safety or privacy in AI system software an elusive goal. ...
arXiv:2202.09292v1
fatcat:me6dbt67yfatxhibe6xsyrcvzy
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems
2018
2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW)
We therefore evaluate the addition of safeguards to digital twins for smart cyber-physical production systems (CPPS) in an Industry 4.0 manufacturing workflow in the form of feature toggles that are managed ...
However, the robustness and fidelity of digital twins are a critical concern, especially when independently developed production systems and corresponding digital twins interfere with one another in a ...
With microservices, digital twins are developed as compositions of smart data processing endpoints and dumb pipes. ...
doi:10.1109/edocw.2018.00021
dblp:conf/edoc/PreuveneersJZ18
fatcat:u7p4vhfo5jbb7hhmlwezbmhsle
Software Tools for the Lifecycle Support of Safety Instrumented Systems
2006
Measurement and control (London. 1968)
Since the publication of IEC 61508 (1) and IEC 61511 (2) there has been a steady increase in the number of PC based software tools developed to aid compliance. ...
Software tools are not just the realm of the design engineer, and this paper draws on experiences to demonstrate the benefits that can be realised by SIS engineering practitioners and end users. ...
Figure 1 -SIS Lifecycle Just like in any other form of engineering, those involved in the SIS lifecycle including development, design, installation and ongoing support need to have an appropriate set of ...
doi:10.1177/002029400603901004
fatcat:c5n3kmiwrnf5taf2bgzo47uhtq
On a 3D scanning robot system design problem
2007
Periodica Polytechnica: Mechanical Engineering
Our purpose was to develop a fully functional, accurate, cheap and safe 3D scanning system based on a 6DOF industrial robot applications. ...
In this given paper we present a new solution to this problem, comprising industrial robots application. ...
data processing. ...
doi:10.3311/pp.me.2007-1.06
fatcat:rifsddtuh5brznouahy63fguja
Privacy and Security Issues in Information Systems
1976
IEEE transactions on computers
In business and industry , valuable information on new product development , marketing , finances , and ~1 anning are kep t in computer systems . ...
A second set of safeguards would stipulate the behavior of an organization maintaining a personal data record system . ...
AFIPS System Review Manua l on Seci~rit~, AFIPS Press , Montvale , New Jersey , 1974. ...
doi:10.1109/tc.1976.1674604
fatcat:suk3sgj4rvaf3do3vlytoot52i
SAFEGUARD: An assured safety net technology for UAS
2016
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)
This work addresses the development of the Safeguard system as an assured safety net technology for UAS. ...
Next, an initial prototype implementation of the described system is disclosed. Lastly, future work including development, testing, and system V&V is summarized. ...
Work is also in progress to develop the software in compliance with NASA's software safety requirements. ...
doi:10.1109/dasc.2016.7778009
fatcat:vzqtj3zdyfbzpbo2lmqp6oyms4
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
2014
Nuclear Engineering and Technology
In Section 4, an integrated development process is proposed for the software security of safety systems. Finally, some conclusions and future work are given in Section 5. ...
AN INTEGRATED DEVELOPMENT PROCESS In this section, we propose a three-stage development process approach based on a security regulation analysis. ...
doi:10.5516/net.04.2012.061
fatcat:kv5us4h2qngrtoynhga4sgf5nq
Safeguarding SCADA Systems with Anomaly Detection
[chapter]
2003
Lecture Notes in Computer Science
Although the methods outlined in this paper are illustrated using the data from an electricity network, this research springs from a more general attempt to improve the security and dependability of SCADA ...
systems using anomaly detection. ...
Acknowledgements We would like to acknowledge Xuan Jin and the other members of the Safeguard project. ...
doi:10.1007/978-3-540-45215-7_14
fatcat:4ahsxtnq2jcozjf6aj6ozbyfk4
Lessons Learned from Soft Computing Applications at SCK-CEN
2010
International Journal of Computational Intelligence Systems
in practice. ...
We draw lessons learned from the examined projects including reactor control, cost estimation, energy policy, and nuclear safeguards. ...
nuclear safeguards evaluation process. ...
doi:10.2991/ijcis.2010.3.2.12
fatcat:wkr42ch52bgpvat3kti5lmznqi
From Peer Production to Productization: A Study of Socially Enabled Business Exchanges in Open Source Service Networks
2008
Information systems research
However, community-based development often falls short of creating software "products" in the sense that consumers understand. ...
The paper reveals the manifestation of social mechanisms in OSSNs and how these are used for coordinating and safeguarding exchanges between firms. ...
Acknowledgments This work has been financially supported by the Irish Research Council for the Humanities and Social Sciences (IRCHSS), the Science Foundation Ireland (SFI) award to Lero-the Irish Software ...
doi:10.1287/isre.1080.0207
fatcat:z3dmjp5ztnbrndrhfv7s2qh7f4
"Seis" — security in embedded IP-based systems
2010
ATZelektronik worldwide
For this reason the innovation alliance for automobile electronics E|ENOVA initiated the research project "SEIS -Safety in Embedded IP-based Systems", with the aim of creating a consistent security solution ...
The constantly increasing variety of networking technologies used in automobiles today results in complex and cost-intensive E/E architectures. ...
The actual objective of the Systems Software subproject is the development of IP based vehicle middleware for interdomain applications. ...
doi:10.1007/bf03242255
fatcat:3s4vcboyqbaafkps5v5lgm55ii
Impenetrable Security System Using Embedded Softwares
2019
International Journal of Electronics Communication & Instrumentation Engineering Research and Development
Self-security also plays a vital role in this highly developing technological era, where authorization and ownership of lockers, banking and others must be secured. ...
With the advent of digitalization, every consumer based services use computers and software as one of their basic requirement for efficient functioning. ...
This circuit isn't designed for a security system in an exceedingly industrial application; however that ought to not forestall anyone from experimenting with it for that purpose. ...
doi:10.24247/ijecierddec20193
fatcat:ywr4ycah25fxbkpandi2ussxca
« Previous
Showing results 1 — 15 out of 52,363 results