Abstract:Summary
Designing safety‐critical software in domains ensuring essential services like transportation, energy, or health requires high assurance techniques and compliance with domain specific standards. As a result of the global interconnectivity and the evolution toward cyber‐physical systems, the increasing exposure to cyber threats calls for the adoption of cyber security standards and frameworks. Although safety and security have different cultures, both fields share similar concepts and tools and are wort… Show more
“…Alternatively, we can implicitly document context information as constraints in logic formulae. However, to leverage the inherent ability of model-based development to overcome challenges due to the inherent complexity of CPS, 29,81,82 we propose a documentation format employing graphical models in the following. For each context perspective, we propose an example list of model elements motivated by our explanations from Section 3 along with a brief description and visual notational element.…”
Section: Notation and Examplesmentioning
confidence: 99%
“…We suggest that explicitly documenting facts and assumption about the system's context (which, in the following, we call “context information”) allows engineers to anticipate what happens when changes occur in the context at runtime. When explicitly documenting this context information alongside the regular engineering artifacts, permissible context configurations can be captured, which are known to retain adequate, safe, and secure functionality 24,29 . This can, for example, aid safety analysis and runtime adaptation, 30 as we will show in Section 6.…”
Section: Introductionmentioning
confidence: 99%
“…When explicitly documenting this context information alongside the regular engineering artifacts, permissible context configurations can be captured, which are known to retain adequate, safe, and secure functionality. 24,29 This can, for example, aid safety analysis and runtime adaptation, 30 as we will show in Section 6.…”
When developing cyber-physical systems (CPS), the context is of vital importance.CPS interact with the world not only through sensing the environment and acting upon it (like embedded systems) but also by communicating with other CPS (like systems in the Internet of Things [IoT]). This means that the context interactions CPS must deal with are much greater than regular embedded or IoT systems: On the one hand, external systems and human users constrain the specific interaction among them. On the other hand, properties of these external systems, human users, and laws, regulations, or standards constrain the way the CPS must be developed. In this paper, we propose a comprehensive, ontologically grounded context modeling framework to systematically explore the problem space in which a CPS under development will operate. This allows for the systematic elicitation of requirements for the CPS, early validation and verification of its properties, and safety assessment of its context interactions at runtime.
“…Alternatively, we can implicitly document context information as constraints in logic formulae. However, to leverage the inherent ability of model-based development to overcome challenges due to the inherent complexity of CPS, 29,81,82 we propose a documentation format employing graphical models in the following. For each context perspective, we propose an example list of model elements motivated by our explanations from Section 3 along with a brief description and visual notational element.…”
Section: Notation and Examplesmentioning
confidence: 99%
“…We suggest that explicitly documenting facts and assumption about the system's context (which, in the following, we call “context information”) allows engineers to anticipate what happens when changes occur in the context at runtime. When explicitly documenting this context information alongside the regular engineering artifacts, permissible context configurations can be captured, which are known to retain adequate, safe, and secure functionality 24,29 . This can, for example, aid safety analysis and runtime adaptation, 30 as we will show in Section 6.…”
Section: Introductionmentioning
confidence: 99%
“…When explicitly documenting this context information alongside the regular engineering artifacts, permissible context configurations can be captured, which are known to retain adequate, safe, and secure functionality. 24,29 This can, for example, aid safety analysis and runtime adaptation, 30 as we will show in Section 6.…”
When developing cyber-physical systems (CPS), the context is of vital importance.CPS interact with the world not only through sensing the environment and acting upon it (like embedded systems) but also by communicating with other CPS (like systems in the Internet of Things [IoT]). This means that the context interactions CPS must deal with are much greater than regular embedded or IoT systems: On the one hand, external systems and human users constrain the specific interaction among them. On the other hand, properties of these external systems, human users, and laws, regulations, or standards constrain the way the CPS must be developed. In this paper, we propose a comprehensive, ontologically grounded context modeling framework to systematically explore the problem space in which a CPS under development will operate. This allows for the systematic elicitation of requirements for the CPS, early validation and verification of its properties, and safety assessment of its context interactions at runtime.
“…The authors identify cross‐fertilization between the two areas and how the method from one area can be utilized in the other. A very narrow view of this cross‐fertilization is discussed within the industrial control applications in the work of Kriaa et al 144 Another work on cross‐fertilization, focusing on common standards and approaches to deeper entangle safety and security, is from Ponsard et al 175 In contrast to these works, our study focuses on the MDE of safety and security systems, what are the proposed methods and tools for each development stage, and what are various types of contributions in this regard.…”
This article presents a systematic mapping study on the model-driven engineering of safety and security concerns in software systems. Combined modeling and development of both safety and security concerns is an emerging field of research as both concerns affect one another in unique ways. Our mapping study provides an overview of the current state of the art in this field. This study carefully selected 143 publications out of 27,259 relevant papers through a rigorous and systematic process. This study then proposes and answers questions such as frequently used methods and tools and development stages where these concerns are typically investigated in application domains. Additionally, we identify the community's preference for publication venues and trends. The discussion on obtained results also features the gained insights and future research directions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.