2009
DOI: 10.1002/sys.20122
|View full text |Cite
|
Sign up to set email alerts
|

Enabling system evolution through configuration management on the hardware/software boundary

Abstract: As the use of software and electronics in modern products is omnipresent and continuously increasing, companies in the embedded systems industry face increasing complexity in controlling and enabling the evolution of their IT-intensive products. Traditionally, product configurations and their updates were managed separately for the hardware and software discipline. At specified release moments during the development of their products, the hardware and software were released together. But, as the usage, flexibi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 57 publications
(49 reference statements)
0
6
0
Order By: Relevance
“…Moreover, not only should the company create and maintain these documents, it should also make sure that the sources are stored properly and remain fully accessible for 15 years. In the regulations documents [Krikhaar et al, ; U.S. Food and Drug Administration (FDA), ], a case is described where a manufacturer did not possess the software source code of a part that behaved erratically in the field. The component supplier had withdrawn without granting the manufacturer the right to access the source code.…”
Section: Systems Engineering and Mrimentioning
confidence: 99%
“…Moreover, not only should the company create and maintain these documents, it should also make sure that the sources are stored properly and remain fully accessible for 15 years. In the regulations documents [Krikhaar et al, ; U.S. Food and Drug Administration (FDA), ], a case is described where a manufacturer did not possess the software source code of a part that behaved erratically in the field. The component supplier had withdrawn without granting the manufacturer the right to access the source code.…”
Section: Systems Engineering and Mrimentioning
confidence: 99%
“…Disciplines: Under the SCM view, the system configuration is composed by CIs that contain software code, as well as items that represent, model, or simulate a piece of hardware (electronic schemas or printed circuit board descriptions). New challenges appear [Krikhaar et al, 2009]: In particular, the integrated hardware/software configurations must be managed carefully, as the two disciplines, which have been traditionally separated, must cooperate closely on a regular base. This requires adequate SCM functionality for storing hardware and software sources, but also for interdisciplinary release management.…”
Section: A 5-axis Reference Model For Software Configuration Managementmentioning
confidence: 99%
“…Policies and standards pertaining to IT security, such as ISO 27001 [ISO, ] and NIST Special Publications 800‐series [NIST, ], have grown in importance in the systems engineering community. Furthermore, the relevance of IT and cyber‐security on the systems engineering domain has been underscored in recent publications [see, for examples, Krikhaar et al., ; Bayuk and Horowitz, ]. A vast number of publications on IT security have focused on systems architecting and firm‐level organizational policies; nevertheless, there is also a need to broaden IT security as a macroeconomic systems engineering problem.…”
Section: Introductionmentioning
confidence: 99%