Traceable Engineering of Fault-Tolerant SoSs

Size: px
Start display at page:

Download "Traceable Engineering of Fault-Tolerant SoSs"

Transcription

1 Traceable Engineering of Fault-Tolerant SoSs Zoe Andrews, Claire Ingram, Richard Payne and Alexander Romanovsky Newcastle University, UK Jon Holt and Simon Perry Scarecrow Consultants Limited, UK SoSECIE webinar: 09/15/2015 SoSECIE 09/15/2015 1

2 Outline Introduction Engineering Fault-Tolerant SoSs Conclusions SoSECIE 09/15/2015 2

3 Outline Introduction Systems of Systems Systems of Systems and Dependability The Fault Modelling and Analysis Method Engineering Fault-Tolerant SoSs Conclusions SoSECIE 09/15/2015 3

4 Our Research Design technology (foundations, methods, tools) for: Systems of Systems (SoS) Cyber-Physical Systems (CPS) We focus on model-based design: Models as a basis for collaborative development Machine-assisted analysis of models as a means of managing development risk "HVAC Ventilation Exhaust" by PictorialEvidence - Own work. Licensed under CC BY-SA 3.0 via Wikimedia Commons - SoSECIE 09/15/2015 4

5 Current Projects Strongly supported by European Union Current Priorities: Research: development of sound toolchains for verifying global properties of CPSs (INTO-CPS) Innovation Support: creating ecosystems in model-based engineering for CPS (CPSE Labs) Strategic Actions: Roadmaps and Transatlantic Research Agenda (Road2CPS, TAMS4CPS) SoSECIE 09/15/2015 5

6 Systems of Systems Assembly and integration of independent constituent systems interacting via a networked infrastructure Collectively offer a new global ( emergent ) service on which value and reliance is placed. Independence Distribution Evolution Emergence Model-based SoS Engineering as a way of mastering complexity SoSECIE 09/15/2015 6

7 COMPASS Technology «Fault Activation View» {faultsofinterest = Complete Failure of the Radio System} Initiate Rescue Fault Activation [Fault 1] CC : Call Centre : Radio System ERU1 : ERU : Start rescue : Find idle ERUs «Fault Activation» : Fault 1 activation [idle ERU] : Allocate idle ERU [no idle ERU] : Send rescue info to ERU : Process message : Receive message [higher criticality] : Divert ERU [lower criticality] : Wait : Log diversion «Error Detection» «erroneous» : Error 1 detection : Drop message «Failure Event» : Target not attended : Service rescue : Start rescue «Start Recovery» : Start Recovery 1 «End Recovery» : End Recovery 1 Semi-formal Modelling SysML used for SoS modelling Guidelines for Requirements, Architecture, Integration SoS modelling profiles Architectural patterns and extensible architectural frameworks (AFs) SoSECIE 09/15/2015 7

8 COMPASS Technology «Fault Activation View» {faultsofinterest = Complete Failure of the Radio System} Initiate Rescue Fault Activation [Fault 1] CC : Call Centre : Radio System : Start rescue «Fault Activation» : Find idle ERUs : Fault 1 activation [idle ERU] : Allocate : Send rescue : Process idle ERU info to ERU message [no idle ERU] [higher criticality] : Divert ERU [lower «Error Detection» «erroneous» criticality] : Error 1 detection : Drop message : Wait : Log diversion «Failure Event» : Target not attended : Start rescue «Start Recovery» : Start Recovery 1 ERU1 : ERU : Receive message : Service rescue «End Recovery» : End Recovery 1 process CallCentreProc = begin actions MERGE1(r) = (dcl e: set of e := findidleerus(); if e = {} then DECISION2(r) else (dcl e1: e1 := allocateidleeru(e, r); MERGE2(e1, r))) process InitiateRescue = CallCentreProc [ SEND_CHANNELS ] RadioSystemProc [ RCV_CHANNELS ] ERUsProc Semi-formal Modelling SysML used for SoS modelling Guidelines for Requirements, Architecture, Integration SoS modelling profiles Architectural patterns and extensible architectural frameworks (AFs) Formal Modelling CML allows representation of behavioural semantics of the SoS Supports contract specification Describes functionality, objectorientation, concurrency, real-time, mobility. Can be extended to new paradigms SoSECIE 09/15/2015 8

9 COMPASS Technology «Fault Activation View» {faultsofinterest = Complete Failure of the Radio System} Initiate Rescue Fault Activation [Fault 1] CC : Call Centre : Radio System : Start rescue «Fault Activation» : Find idle ERUs : Fault 1 activation [idle ERU] : Allocate : Send rescue : Process idle ERU info to ERU message [no idle ERU] [higher criticality] : Divert ERU [lower «Error Detection» «erroneous» criticality] : Error 1 detection : Drop message : Wait : Log diversion «Failure Event» : Target not attended : Start rescue «Start Recovery» : Start Recovery 1 ERU1 : ERU : Receive message : Service rescue «End Recovery» : End Recovery 1 process CallCentreProc = begin actions MERGE1(r) = (dcl e: set of e := findidleerus(); if e = {} then DECISION2(r) else (dcl e1: e1 := allocateidleeru(e, r); MERGE2(e1, r))) process InitiateRescue = CallCentreProc [ SEND_CHANNELS ] RadioSystemProc [ RCV_CHANNELS ] ERUsProc Semi-formal Modelling SysML used for SoS modelling Guidelines for Requirements, Architecture, Integration SoS modelling profiles Architectural patterns and extensible architectural frameworks (AFs) Formal Modelling CML allows representation of behavioural semantics of the SoS Supports contract specification Describes functionality, objectorientation, concurrency, real-time, mobility. Can be extended to new paradigms Tool-supported Analysis Model-checker Automated proof Static Fault Analysis Test generation Simulation Model-in-Loop Test Exploration of design space SoSECIE 09/15/2015 9

10 SoS and Dependability Independence Distribution Evolution Emergence Challenge: CSs are autonomous and independent, responsibility for preventing SoS failure when a CS fails or withdraws from the SoS is unclear Approach: Record explicitly where responsibility for fault tolerance lies SoSECIE 09/15/

11 SoS and Dependability Independence Distribution Evolution Emergence Challenge: Networking technology that SoSlevel functionality relies on may introduce faults Approach: Model-based support for exploration of recovery strategies that can be applied when networking failures occur SoSECIE 09/15/

12 SoS and Dependability Independence Distribution Evolution Emergence Challenge: CSs evolve independently, need to preserve dependability under evolutions of the SoS Approach: Model-based traceability facilitates impact analysis to understand the impact of unexpected changes SoSECIE 09/15/

13 SoS and Dependability Independence Distribution Evolution Emergence Challenge: Need to analyse the emergent dependability of the SoS, but constituents systems may be black boxes Approach: Document fault assumptions for constituents and provide tool support for analysis of emergent dependability properties SoSECIE 09/15/

14 SoS and Dependability SoS failure SoS error SoS fault a deviation of the service provided by the SoS from expected (correct) behaviour the part of the SoS state that can lead to its subsequent service failure the adjudged or hypothesised cause of an error The focus of our work is on fault-tolerant SoSs preventing SoS failures from arising in the presence of faults achieved by detecting errors and conducting system recovery Avizienis, A.; Laprie, J.-C.; Randell, B. & Landwehr, C., "Basic concepts and taxonomy of dependable and secure computing," Dependable and Secure Computing, IEEE Transactions on, vol.1, no.1, pp.11,33, Jan.-March SoSECIE 09/15/

15 Methodology Informal Requirements Fault Tolerance Verification Requirements Engineering Architectural Design Fault Analysis Traceability SoSECIE 09/15/

16 Technologies Fault Tolerance Verification Plugin HiP-HOPS Traceability Pattern Fault Analysis Tool SoS-ACRE Fault Modelling Architectural Framework Fault Analysis Architectural Framework SoSECIE 09/15/

17 Technologies Fault Tolerance Verification Plugin HiP-HOPS Modelling Traceability Pattern Fault Analysis Tool SoS-ACRE Fault Modelling Architectural Framework Fault Analysis Architectural Framework Analysis SoSECIE 09/15/

18 COMPASS AF Framework (CAFF) Approach CAFF APPROACH Define Ontology Define Viewpoints Define Rules SoSECIE 09/15/

19 COMPASS AF Framework (CAFF) Approach CAFF APPROACH Define Ontology Define Viewpoints Define Rules Ontology System System of Systems Constituent System SoSECIE 09/15/

20 COMPASS AF Framework (CAFF) Approach CAFF APPROACH Define Ontology Define Viewpoints Define Rules Ontology System Fault/Error/Failure Definition Viewpoint Viewpoints Threats Chain Viewpoint Fault Tolerance Structure Viewpoint System of Systems Fault Tolerance Connections Constituent Viewpoint System Erroneous/Recovery Processes Viewpoint Viewpoints use modelling elements from ontology SoSECIE 09/15/

21 COMPASS AF Framework (CAFF) Approach CAFF APPROACH Define Ontology Define Viewpoints Define Rules Ontology System Fault/Error/Failure Definition Viewpoint Viewpoints Rules Rule Threats FMAF01: All faults, Fault errors Tolerance and failures modelled in the Fault Chain Modelling Architectural Structure Framework must be defined in the ViewpointFault/Error/Failure Viewpoint Definition View (FEFDV). System of Systems Fault Tolerance Connections Constituent Viewpoint System Rule Erroneous/Recovery FMAF02: All constituents included in a Threats Chain View (TCV) must Processes be included in the corresponding Fault Tolerance Structure View (FTSV) and Fault Tolerance Connections View Viewpoint (FTCV). Rules restrict how the viewpoints may be applied SoSECIE 09/15/

22 Outline Introduction Engineering Fault-Tolerant SoSs Case Study Requirements Engineering Fault Modelling Requirements Tracing Fault Analysis Conclusions SoSECIE 09/15/

23 Emergency Response SoS SoSECIE 09/15/

24 Emergency Response SoS SoSECIE 09/15/

25 Emergency Response SoS SoSECIE 09/15/

26 Emergency Response SoS??? SoSECIE 09/15/

27 Requirements Engineering Apply SoS-ACRE: a structured way of engineering and managing the requirements of an SoS We focus on the requirements engineering processes Key elements of SoS-ACRE for fault tolerance: define the fault tolerance requirements of the SoS (what faults) examine the fault tolerance requirements in the context of the CSs identify error detection and recovery scenarios SoSECIE 09/15/

28 ER SoS: Context Interaction Requirement: Tolerate Radio System Failure SoSECIE 09/15/

29 ER SoS: Context Interaction Requirement: Tolerate Radio System Failure SoSECIE 09/15/

30 ER SoS: Context Interaction SoSECIE 09/15/

31 Fault Modelling Defined a Fault Modelling Architectural Framework (FMAF) + SysML profile Prompts an SoS engineer to consider the impact of faults at the early stages of design A coherent set of views & concepts for designing fault-tolerant SoSs FMAF Ontology Viewpoints Rules SoSECIE 09/15/

32 Fault Modelling Defined a Fault Modelling Architectural Framework (FMAF) + SysML profile Prompts an SoS engineer to consider the impact of faults at the early stages of design A coherent set of views & concepts for designing fault-tolerant SoSs FMAF Ontology Viewpoints Rules SoSECIE 09/15/

33 FMAF: Ontology Definition SoSECIE 09/15/

34 FMAF: Ontology Definition SoSECIE 09/15/

35 FMAF: Ontology Definition SoS failure: a deviation of the service provided by the SoS from expected (correct) behaviour SoS error: the part of the SoS state that can lead to its subsequent service failure SoS fault: the adjudged or hypothesised cause of an error SoSECIE 09/15/

36 FMAF: Viewpoints FMAF Viewpoints Ontology Structure Behaviour Rules SoSECIE 09/15/

37 FMAF: Viewpoints FMAF Viewpoints Ontology Structure Behaviour Rules Structural Viewpoints Fault/Error/Failure Definition Threats Chain Fault Tolerance Structure Fault Tolerance Connections SoSECIE 09/15/

38 FMAF: Viewpoints FMAF Viewpoints Ontology Structure Behaviour Rules Structural Viewpoints Behavioural Viewpoints Fault/Error/Failure Definition Threats Chain Erroneous/Recovery Processes Erroneous/Recovery Scenarios Fault Tolerance Structure Fault Tolerance Connections Fault Activation Recovery SoSECIE 09/15/

39 FMAF: Viewpoints FMAF Viewpoints Ontology Structure Behaviour Rules Structural Viewpoints Behavioural Viewpoints Fault/Error/Failure Definition Threats Chain Erroneous/Recovery Processes Erroneous/Recovery Scenarios Fault Tolerance Structure Fault Tolerance Connections Fault Activation Recovery SoSECIE 09/15/

40 ER SoS: Threats Chain SoSECIE 09/15/

41 ER SoS: Threats Chain SoSECIE 09/15/

42 ER SoS: Threats Chain SoSECIE 09/15/

43 ER SoS: Fault Activation «Fault Activation View» {faultsofinterest = Complete Failure of the Radio System} Initiate Rescue Fault Activation [Fault 1] CC : Call Centre : Radio System ERU1 : ERU : Start rescue : Find idle ERUs : Send rescue info to ERU : Process message : Receive message [no idle ERU] [idle ERU] : Allocate idle ERU «Fault Activation» : Fault 1 activation [higher criticality] : Divert ERU [lower criticality] : Wait For the rescue the ERU was diverted from : Log diversion : Start rescue «Error Detection» : Error 1 detection... «Erroneous... : Drop message «Failure Event» : Target not attended : Service rescue «Start Recovery» : Start Recovery 1 «End Recovery» : End Recovery 1 SoSECIE 09/15/

44 ER SoS: Fault Activation «Fault Activation View» {faultsofinterest = Complete Failure of the Radio System} Initiate Rescue Fault Activation [Fault 1] CC : Call Centre : Radio System ERU1 : ERU : Start rescue : Find idle ERUs : Send rescue info to ERU : Process message : Receive message [no idle ERU] [idle ERU] : Allocate idle ERU «Fault Activation» : Fault 1 activation [higher criticality] : Divert ERU [lower criticality] : Wait For the rescue the ERU was diverted from : Log diversion : Start rescue «Error Detection» : Error 1 detection... «Erroneous... : Drop message «Failure Event» : Target not attended : Service rescue «Start Recovery» : Start Recovery 1 «End Recovery» : End Recovery 1 SoSECIE 09/15/

45 ivation [Fault 1] : Radio System ERU1 : ERU ER SoS: Fault Activation Send rescue info to ERU : Process message «Fault Activation» : Fault 1 activation : Receive message «Error Detection» : Error 1 detection... «Erroneous... : Drop message «Failure Event» : Target not attended : Service rescue «Start Recovery» : Start Recovery 1 «End Recovery» : End Recovery 1 SoSECIE 09/15/

46 Requirements Tracing Traceability Pattern a structured way of defining traceability in this case we will use it for fault tolerance requirements traceability Use case Detected by dependency (FMAF Threats Chain Viewpoint) (SoS-ACRE Context Interaction Viewpoint) Validation View (SoS-ACRE Viewpoint) SoSECIE 09/15/

47 Requirements Tracing (ER SoS) SoSECIE 09/15/

48 Fault Analysis Assists an SoS engineer in analysing the impact of CS/component level faults on SoS functionalities Provide modelling and tool support for static fault analysis Fault Analysis Architectural Framework (FAAF) + SysML profile Ergonomic profile and translation tool for Atego Modeler Fault analysis capabilities provided by HiP-HOPS tool Fault Tree Analysis Failure Modes and Effects Analysis SoSECIE 09/15/

49 Fault Analysis: Example SoS CS1 CS3 CS2 SoSECIE 09/15/

50 Fault Analysis: Example SoS CS1 A CS3 C CS2 B SoSECIE 09/15/

51 Fault Analysis: Example SoS SoS failure CS1 A CS3 C CS2 B C A B SoSECIE 09/15/

52 Tool Overview 1. Ergonomic profiling SoSECIE 09/15/

53 Tool Overview 1. Ergonomic profiling 2. Exporting models for analysis SoSECIE 09/15/

54 SoSECIE 09/15/

55 Outline Introduction Engineering Fault-Tolerant SoSs Conclusions SoSECIE 09/15/

56 Conclusions Systems of systems have characteristics that motivate a structured approach to fault modelling and analysis of SoSs: Modelling support for requirements engineering, architectural design, requirements tracing of fault-tolerant SoSs Modelling and tool support for fault tolerance verification and static fault analysis Future directions: Tool-supported integration of the fault modelling and fault analysis architectural frameworks and SysML profiles Support for modes of operation, either functional modes or degraded modes (e.g. partial functionality in presence of errors) Multi-objective optimisation, trading off attributes such as dependability, cost and energy consumption SoSECIE 09/15/

57 @riffio This work is part of the COMPASS project: research into model-based techniques for developing, maintaining and analysing SoSs thecompassclub.org SoSECIE 09/15/

58 Further Reading Andrews, Z.; Fitzgerald, J.; Payne, R. and Romanovsky, A. Fault Modelling for Systems of Systems, in Proceedings of the 11th International Symposium on Autonomous Decentralised Systems (ISADS 2013), March 2013, pp Andrews, Z.; Payne, R.; Romanovsky, A.; Didier, A. L. and Mota, A Model-based development of fault tolerant systems of systems in Proceedings of the 2013 IEEE International Systems Conference (SysCon 2013). Ingram, C.; Riddle, S.; Fitzgerald J.; Al-Lawati, S.A.H.J.; Alrbaiyan, A., SoS Fault Modelling at the Architectural Level in an Emergency Response Case Study in Proceedings of the Workshop on Engineering Dependable Systems of Systems, 2014 (EDSoS 2014) Andrews, Z.; Ingram, C.; Payne, R.; Plat, N., SysML Fault Modelling in a Traffic Management System of Systems in Proceedings of the 2014 IEEE International Systems of Systems Engineering Conference (SoSE 2014). Andrews, Z.; Ingram, C.; Payne, R.; Romanovsky, A.; Perry, S. & Holt, J., Traceable Engineering of Fault-Tolerant SoSs, in International INCOSE Symposium, Las Vegas, USA, June-July COMPASS Deliverables D24.2, D33.3 and D43.3: Fault Analysis Tool: Atego Modeler: HiP-HOPS: SoSECIE 09/15/

SoS Fault Modelling at the Architectural Level in an Emergency Response Case Study

SoS Fault Modelling at the Architectural Level in an Emergency Response Case Study SoS Fault Modelling at the Architectural Level in an Emergency Response Case Study Claire Ingram, Steve Riddle, John Fitzgerald, Sakina A.H.J. Al-Lawati, Afra Alrbaiyan Newcastle University, Newcastle

More information

SysML Fault Modelling in a Traffic Management System of Systems

SysML Fault Modelling in a Traffic Management System of Systems SysML Fault Modelling in a Traffic Management System of Systems Claire Ingram, Zoe Andrews, Richard Payne School of Computing Science Newcastle University, UK Email: claire.ingram, zoe.andrews, richard.payne@ncl.ac.uk

More information

Fault Modelling in System-of-Systems Contracts

Fault Modelling in System-of-Systems Contracts Fault Modelling in System-of-Systems Contracts Zoe Andrews, Jeremy Bryans, Richard Payne School of Computing Science Newcastle University, UK {firstname.lastname}@ncl.ac.uk Klaus Kristensen Bang & Olufsen,

More information

COMPASS Web Site, Project Fiche and Online Community

COMPASS Web Site, Project Fiche and Online Community Grant Agreement: 287829 Comprehensive Modelling for Advanced Systems of Systems COMPASS Web Site, Project Fiche and Online Community Deliverable Number: D51.1 Version: 1.0 Date: October 2011 Public Document

More information

Static Fault Analysis Support - User Manual

Static Fault Analysis Support - User Manual Grant Agreement: 287829 Comprehensive Modelling for Advanced Systems of Systems Static Fault Analysis Support - User Manual Technical Note Number: D33.3a Version: 1.1 Date: June 2014 Public Document http://www.compass-research.eu

More information

Static Fault Analysis Support - Technical Manual

Static Fault Analysis Support - Technical Manual Grant Agreement: 287829 Comprehensive Modelling for Advanced Systems of Systems Static Fault Analysis Support - Technical Manual Technical Note Number: D33.3b Version: 1.1 Date: June 2014 Public Document

More information

Features of CML: a formal modelling language for Systems of Systems

Features of CML: a formal modelling language for Systems of Systems Features of CML: a formal modelling language for Systems of Systems J. Woodcock, A. Cavalcanti, J. Fitzgerald, P. Larsen, A. Miyazawa, and S. Perry University of York, United Kingdom, {jim.woodcock, Ana.Cavalcanti,

More information

Formal methods for a system of systems analysis framework applied to traffic management

Formal methods for a system of systems analysis framework applied to traffic management Loughborough University Institutional Repository Formal methods for a system of systems analysis framework applied to traffic management This item was submitted to Loughborough University's Institutional

More information

A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels. M. Schwarz M. Chaari, B.-A. Tabacaru, W.

A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels. M. Schwarz M. Chaari, B.-A. Tabacaru, W. A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels M. Schwarz M. Chaari, B.-A. Tabacaru, W. Ecker Outline Motivation Objectives Limitations Concept Simulation Conclusion

More information

Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP

Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP 2005-06 06 IST Call 5 Preparatory Workshop Brussels, 31 Jan 1 Feb 2005 Enabling application Max Lemke Deputy Head

More information

Synergies of the Common Criteria with Other Standards

Synergies of the Common Criteria with Other Standards Synergies of the Common Criteria with Other Standards Mark Gauvreau EWA-Canada 26 September 2007 Presenter: Mark Gauvreau (mgauvreau@ewa-canada.com) Overview Purpose Acknowledgements Security Standards

More information

An Information Model for High-Integrity Real Time Systems

An Information Model for High-Integrity Real Time Systems An Information Model for High-Integrity Real Time Systems Alek Radjenovic, Richard Paige, Philippa Conmy, Malcolm Wallace, and John McDermid High-Integrity Systems Group, Department of Computer Science,

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 and Risk Approach June 9, 2016 cyberframework@nist.gov Executive Order: Improving Critical Infrastructure

More information

IT Expert (Enterprise Network and Infrastructure Architect)

IT Expert (Enterprise Network and Infrastructure Architect) IT Expert (Enterprise Network and Infrastructure Architect) Reference 2015-221-EXT Type of contract Who can apply Salary Working time Place of work Closing date for applications Fixed-term contract which

More information

1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake

1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake Sample ISTQB examination 1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake 2 Regression testing should

More information

Dependability tree 1

Dependability tree 1 Dependability tree 1 Means for achieving dependability A combined use of methods can be applied as means for achieving dependability. These means can be classified into: 1. Fault Prevention techniques

More information

Certificate Software Asset Management Essentials Syllabus. Version 2.0

Certificate Software Asset Management Essentials Syllabus. Version 2.0 Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials

More information

Computing Curricula 2005

Computing Curricula 2005 Computing Curricula Santiago, Chile 6 March John Impagliazzo Computing Curricula An Overview Report John Impagliazzo Computer Science Hofstra University New York John Impagliazzo Computing Curricula Santiago,

More information

Software Engineering: Integration Requirements

Software Engineering: Integration Requirements Software Engineering: Integration Requirements AYAZ ISAZADEH Department of Computer Science Tabriz University Tabriz, IRAN Abstract: - This paper presents a discussion of software integration requirements,

More information

Advanced Software Engineering: Software Testing

Advanced Software Engineering: Software Testing Advanced Software Engineering: Software Testing COMP 3705(L4) Sada Narayanappa Anneliese Andrews Thomas Thelin Carina Andersson Web: http://www.megadatasys.com Assisted with templates News & Project News

More information

Factsheet. Power Generation Service Energy efficiency in power generation and water

Factsheet. Power Generation Service Energy efficiency in power generation and water Factsheet Power Generation Service Energy efficiency in power generation and water Opportunity identification Opportunity identification overview The opportunity identification phase of Industrial Energy

More information

WORK PROGRAMME

WORK PROGRAMME WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Michel LACROIX European Commission DG CONNECT Software & Services, Cloud michel.lacroix@ec.europa.eu From FP7 to H2020 Preparation

More information

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.

More information

Case Studies of SysML to CML transformations. COMPASS White Paper 09. Date: March Public Document

Case Studies of SysML to CML transformations. COMPASS White Paper 09. Date: March Public Document Project: COMPASS Grant Agreement: 287829 Comprehensive Modelling for Advanced Systems of Systems Case Studies of SysML to CML transformations COMPASS White Paper 09 Date: March 2014 Public Document http://www.compass-research.eu

More information

SysML and FMI in INTO-CPS

SysML and FMI in INTO-CPS Grant Agreement: 644047 Integrated Tool chain for model-based design of CPSs SysML and FMI in Deliverable Number: D4.1c Version: 0.7 Date: 2015 Public Document www.into-cps.au.dk D4.1c SysML and FMI in

More information

Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice

Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice Dr Richard Piggin 16 November 2017 - Atkins Limited 1 Introduction Background Motivation Safety Engineering

More information

Designing a System Engineering Environment in a structured way

Designing a System Engineering Environment in a structured way Designing a System Engineering Environment in a structured way Anna Todino Ivo Viglietti Bruno Tranchero Leonardo-Finmeccanica Aircraft Division Torino, Italy Copyright held by the authors. Rubén de Juan

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should

More information

Semantics-Based Integration of Embedded Systems Models

Semantics-Based Integration of Embedded Systems Models Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current

More information

Metadata Framework for Resource Discovery

Metadata Framework for Resource Discovery Submitted by: Metadata Strategy Catalytic Initiative 2006-05-01 Page 1 Section 1 Metadata Framework for Resource Discovery Overview We must find new ways to organize and describe our extraordinary information

More information

Software Quality. Richard Harris

Software Quality. Richard Harris Software Quality Richard Harris Part 1 Software Quality 143.465 Software Quality 2 Presentation Outline Defining Software Quality Improving source code quality More on reliability Software testing Software

More information

Practical Model-based Testing With Papyrus and RT-Tester

Practical Model-based Testing With Papyrus and RT-Tester Practical Model-based Testing With Papyrus and RT-Tester Jan Peleska and Wen-ling Huang University of Bremen Verified Systems International GmbH Fourth Halmstad Summer School on Testing, 2014-06-11 Acknowledgements.

More information

EU Research for Secure Societies

EU Research for Secure Societies EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies

More information

COMeSafety Specific Support Action

COMeSafety Specific Support Action COMeSafety Specific Support Action Towards a Common European Communication Architecture for for Cooperative Systems Current Status, Major Issues, Next Steps Dr. Dr. Timo Timo Kosch Kosch BMW BMW Group

More information

5G/NR Architecture Is it revolutionary or evolutionary?

5G/NR Architecture Is it revolutionary or evolutionary? 5G/NR Architecture Is it revolutionary or evolutionary? The 5G-MoNArch view David M. Gutierrez Estevez Senior 5G Researcher Samsung Electronics R&D Institute UK IEEE CSCN, September 2017 Initial Thoughts

More information

1. Introduction to Model Checking

1. Introduction to Model Checking CSE6009 Model Checking 1. Introduction to Model Checking Scott Uk-Jin Lee Department of Computer Science and Engineering Hanyang University ERICA Campus 2 nd Semester 2015 System Correctness Correctness

More information

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development

More information

An Extensible Use Case Modeling Approach for Cyber- Physical Systems (CPSs)

An Extensible Use Case Modeling Approach for Cyber- Physical Systems (CPSs) An Extensible Use Case Modeling Approach for Cyber- Physical Systems (CPSs) Gong Zhang 1, Tao Yue 2, Shaukat Ali 2 and Ji Wu 1 1 School of Computer Science and Engineering, Beihang University, Beijing,

More information

Accountable SDNs for Cyber Resiliency UIUC/R2 Monthly Group Meeting. Presented by Ben Ujcich March 31, 2017

Accountable SDNs for Cyber Resiliency UIUC/R2 Monthly Group Meeting. Presented by Ben Ujcich March 31, 2017 Accountable SDNs for Cyber Resiliency UIUC/R2 Monthly Group Meeting Presented by Ben Ujcich March 31, 2017 Outline Motivation for accountability Our accepted paper: Towards an Accountable Software-Defined

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

SOFTWARE QUALITY. MADE IN GERMANY.

SOFTWARE QUALITY. MADE IN GERMANY. UPCOMING IMPACT OF THE SECOND EDITION OF THE ISO 26262 MGIGroup, 11.07.2017 SOFTWARE QUALITY. MADE IN GERMANY. SOLUTIONS FOR INTEGRATED QUALITY ASSURANCE OF EMBEDDED SOFTWARE MOTIVATION Release ISO 26262:2011

More information

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CHALLENGES GOVERNANCE INTEGRATION SECURITY CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Test and Verification Solutions. ARM Based SOC Design and Verification

Test and Verification Solutions. ARM Based SOC Design and Verification Test and Verification Solutions ARM Based SOC Design and Verification 7 July 2008 1 7 July 2008 14 March 2 Agenda System Verification Challenges ARM SoC DV Methodology ARM SoC Test bench Construction Conclusion

More information

Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto

Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto www.thalesgroup.com Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto MBSE Symposium, Canberra Oct. 28 th, 2014 Olivier Flous, VP Engineering 2 / Thales: Company Profile Collective

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017

The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017 The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017 Eva Jaho, ATC e.jaho@atc.gr 1 Outline HMNs Trends: How are HMNs evolving? The need for future-thinking and roadmaps of

More information

Systems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra

Systems Engineering for Software-Defined Network Virtualisation. John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra Systems Engineering for Software-Defined Network Virtualisation John Risson, Solutions Engineering Manager IP and Transport Engineering, Telstra Agenda Motivation Case Studies Opportunities and Challenges

More information

Information and Communication Technologies (ICT) thematic area

Information and Communication Technologies (ICT) thematic area Information and Communication Technologies (ICT) thematic area Network & Service Infrastructures 1.1 The Network of the Future (Call 4, Call 5) 2009-2010 a) Future Internet Architectures and Network Technologies

More information

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in

More information

Presented by Greg Pollari (Rockwell Collins) and Nigel Shaw (Eurostep)

Presented by Greg Pollari (Rockwell Collins) and Nigel Shaw (Eurostep) System Architecture Virtual Integration (SAVI) Project : Intermodel Error Checking and Consistency Review and Demonstration An Aerospace Vehicle Systems Institute Project (AVSI) Presented by Greg Pollari

More information

Standards for Building Autonomy

Standards for Building Autonomy Standards for Building Autonomy Andrew Richards, CEO, Codeplay BSI Standards Matter, Edinburgh, 22 nd June 2017 How do we get from here Level 2 Level 3 Limited overall control Level 4 Deep self control

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

Version: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure

Version: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure Version: V2.0 Integrated Building 19 April 2013 Architecture dimension data advanced infrastructure Agenda Framework for Implementation Case Studies Copyright Dimension Data 19 April 2013 2 Question Given

More information

Organizational Readiness for Digital Transformation

Organizational Readiness for Digital Transformation IVI Community Event Organizational Readiness for Digital Transformation Dr. Marian Carcary June 22nd 2017 Introduction Digital business transformation goes beyond traditional process optimization, to leveraging

More information

ITIL 4 The Next Evolution

ITIL 4 The Next Evolution ITIL 4 The Next Evolution #askitsm @ITSMAcademy info@itsmacademy.com Donna Knapp @ITSM_Donna www.itsmacademy.com www.itsmprofessor.net About ITSM Campus ITIL Foundation ITIL Practitioner Certified Process

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Cyber Security Beyond 2020

Cyber Security Beyond 2020 Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java

Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Andrew Foster Product Manager PrismTech Corporation The Case for Java in Enterprise Real-Time Systems

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Component Failure Mitigation According to Failure Type

Component Failure Mitigation According to Failure Type onent Failure Mitigation According to Failure Type Fan Ye, Tim Kelly Department of uter Science, The University of York, York YO10 5DD, UK {fan.ye, tim.kelly}@cs.york.ac.uk Abstract Off-The-Shelf (OTS)

More information

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities

More information

COMPASS: FORMAL METHODS FOR SYSTEM-SOFTWARE CO-ENGINEERING

COMPASS: FORMAL METHODS FOR SYSTEM-SOFTWARE CO-ENGINEERING COMPASS: FORMAL METHODS FOR SYSTEM-SOFTWARE CO-ENGINEERING Viet Yen Nguyen Lehrstuhl für Informatik 2, RWTH Aachen University nguyen@cs.rwth-aachen.de Technology Innovation Days, ESA/ESTEC, 2011 ABOUT

More information

ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME

ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME Jan Van Doorn EUROCONTROL Experimental Centre, France Director European 1 Organisation for the Safety of Air Navigation Demand

More information

MODEL-BASED SYSTEMS ENGINEERING DESIGN AND TRADE-OFF ANALYSIS WITH RDF GRAPHS

MODEL-BASED SYSTEMS ENGINEERING DESIGN AND TRADE-OFF ANALYSIS WITH RDF GRAPHS MODEL-BASED SYSTEMS ENGINEERING DESIGN AND TRADE-OFF ANALYSIS WITH RDF GRAPHS Nefretiti Nassar and Mark Austin Institute of Systems Research, University of Maryland, College Park, MD 20742. CSER 2013 Presentation,

More information

A Comparative Analysis of Architecture Frameworks

A Comparative Analysis of Architecture Frameworks A Comparative Analysis of Architecture Frameworks Antony Tang Jun Han Pin Chen School of Information Technology DSTO C3 Research Centre Swinburne University of Technology Department of Defence Melbourne,

More information

Harmonization of usability measurements in ISO9126 software engineering standards

Harmonization of usability measurements in ISO9126 software engineering standards Harmonization of usability measurements in ISO9126 software engineering standards Laila Cheikhi, Alain Abran and Witold Suryn École de Technologie Supérieure, 1100 Notre-Dame Ouest, Montréal, Canada laila.cheikhi.1@ens.etsmtl.ca,

More information

SOFTWARE ENGINEERING DECEMBER. Q2a. What are the key challenges being faced by software engineering?

SOFTWARE ENGINEERING DECEMBER. Q2a. What are the key challenges being faced by software engineering? Q2a. What are the key challenges being faced by software engineering? Ans 2a. The key challenges facing software engineering are: 1. Coping with legacy systems, coping with increasing diversity and coping

More information

CORPORATE PRESENTATION

CORPORATE PRESENTATION CORPORATE PRESENTATION SUMMARY Our mission and vision 4 Our values Our figures 4 5 Organisation chart Areas of Activity Defence and Security Space Transport Public Administration ICT Energy 6 8 Ingeniería

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams

More information

Software verification for ubiquitous computing

Software verification for ubiquitous computing Software verification for ubiquitous computing Marta Kwiatkowska Computing Laboratory, University of Oxford QA 09, Grenoble, June 2009 Software everywhere Electronic devices, ever smaller Laptops, phones,

More information

First Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry

First Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry First Science-Policy- Industry meeting on CBRN-E Introductory words Brussels, 30 th January 2014 Philippe Quevauviller Security and Industry DG Enterprise and Industry FP7 CBRN- Where do we stand? Around

More information

Software architecture in ASPICE and Even-André Karlsson

Software architecture in ASPICE and Even-André Karlsson Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12

More information

Model-Based Testing: an Approach with SDL/RTDS and DIVERSITY

Model-Based Testing: an Approach with SDL/RTDS and DIVERSITY Model-Based Testing: an Approach with SDL/RTDS and DIVERSITY {julien.deltour,emmanuel.gaudin} @pragmadev.com {alain.faivre,arnault.lapitre} @cea.fr PragmaDev SAM 2014 French SME, Created in 2001 by 2 experts

More information

Cyber-physical Systems-of-Systems: the AMADEOS approach and Main Advances

Cyber-physical Systems-of-Systems: the AMADEOS approach and Main Advances Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 Cyber-physical Systems-of-Systems: the approach and Main Advances A.

More information

Automatic test generation based on functional coverage

Automatic test generation based on functional coverage 12 juin 2014 Automatic test generation based on functional coverage Emmanuel Gaudin PragmaDev UCAAT 2014 PragmaDev French SME, Created in 2001 by 2 two experts in modelling tools and languages Since creation

More information

Software Architecture in Action. Flavio Oquendo, Jair C Leite, Thais Batista

Software Architecture in Action. Flavio Oquendo, Jair C Leite, Thais Batista Software Architecture in Action Flavio Oquendo, Jair C Leite, Thais Batista Motivation 2 n In this book you can learn the main software architecture concepts and practices. n We use an architecture description

More information

UPU UNIVERSAL POSTAL UNION. CA C 4 SDPG AHG DRM Doc 3. Original: English COUNCIL OF ADMINISTRATION. Committee 4 Development Cooperation

UPU UNIVERSAL POSTAL UNION. CA C 4 SDPG AHG DRM Doc 3. Original: English COUNCIL OF ADMINISTRATION. Committee 4 Development Cooperation UPU UNIVERSAL POSTAL UNION CA C 4 SDPG AHG DRM 2014.1-Doc 3 Original: English COUNCIL OF ADMINISTRATION Committee 4 Development Cooperation Sustainable Development Project Group Ad hoc group on Disaster

More information

The Architecture of a Resilience Infrastructure for Computing and Communication Systems

The Architecture of a Resilience Infrastructure for Computing and Communication Systems The Architecture of a Resilience Infrastructure for Computing and Communication Systems Algirdas Avižienis University of California, Los Angeles, USA, and Vytautas Magnus University, Kaunas, Lithuania

More information

Modeling Requirements, Architectures, Behaviour...

Modeling Requirements, Architectures, Behaviour... Modeling Requirements, Architectures, Behaviour... The System Modeling Language (SysML) and the SYSMOD modeling approach Budapest University of Technology and Economics Department of Measurement and Information

More information

INTO-CPS: An integrated tool chain for comprehensive Model-Based Design of Cyber-Physical Systems

INTO-CPS: An integrated tool chain for comprehensive Model-Based Design of Cyber-Physical Systems INTO-CPS: An integrated tool chain for comprehensive Model-Based Design of Cyber-Physical Systems Alessandra Bagnato SOFTEAM www.into-cps.au.dk SOFTEAM SOFTEAM (ST), a growing company 25+ Years experience

More information

OMG Specifications for Enterprise Interoperability

OMG Specifications for Enterprise Interoperability OMG Specifications for Enterprise Interoperability Brian Elvesæter* Arne-Jørgen Berre* *SINTEF ICT, P. O. Box 124 Blindern, N-0314 Oslo, Norway brian.elvesater@sintef.no arne.j.berre@sintef.no ABSTRACT:

More information

BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL

BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL A few words on Samares Engineering Research and Consultancy on Systems Engineering Requirement engineering Model-Based Systems Engineering Co-simulation

More information

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction BACKGROUND PAPER Sub-Regional Platform on Disaster Risk Reduction Niamey, Niger 11-14 November 2013 1 BACKGROUND The ECOWAS Policy on Disaster Risk Reduction adopted by West African Heads of State and

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

Windows Communication Foundation (WCF) Visual Studio 2008

Windows Communication Foundation (WCF) Visual Studio 2008 Windows Communication Foundation (WCF) Visual Studio 2008 Course 6461 - Three days - Instructor-led - Hands-on Introduction This three-day instructor-led course provides students with the knowledge and

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

How can the Future Internet

How can the Future Internet How can the Future Internet enable Smart Energy? Presented by Werner Mohr (Coordinator), Nokia Siemens Networks on behalf of the FINSENY project Smart Energy enabled by Future Internet Workshop FINSENY

More information

AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP

AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP GASeP: The Roadmap to foster Aviation Security in Africa and the Middle East Sharm El Sheikh, Egypt, 22-24 August 2017 REGIONAL MINISTERIAL CONFERENCE ON

More information

New Digital Business Models Driving the Softwarization of the Network

New Digital Business Models Driving the Softwarization of the Network New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:

More information

VITAL: Variability Improvement Analysis of Software Product Line Infrastructure

VITAL: Variability Improvement Analysis of Software Product Line Infrastructure FOSD Meeting 2014 VITAL: Variability Improvement Analysis of Software Product Line Infrastructure Bo Zhang University of Kaiserslautern Kaiserslautern, Germany bo.zhang@cs.uni-kl.de 2014-05-05 Context

More information

Mission Critical Mobile Broadband:

Mission Critical Mobile Broadband: Critical communications for all professional users Follow us on @TCCAcritcomms February 2013 CRITICAL COMMUNICATIONS BROADBAND GROUP WHITE PAPER Mission Critical Mobile Broadband: Important Note The opinions

More information