Skip to main content

Towards Trust Assurance and Certification in Cyber-Physical Systems

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8696))

Included in the following conference series:

Abstract

We are currently witnessing a 3rd industrial revolution, driven by ever more interconnected distributed systems of systems, running under the umbrella term of cyber-physical systems (CPS). In the context of this paradigm, different types of computer-based systems from different application domains collaborate with each other in order to render higher level services that could not be rendered by single systems alone. However, the tremendous potential of CPS is inhibited due to significant engineering challenges with respect to the systems safety and security. Traditional methodologies are not applicable to CPS without further ado and new solutions are therefore required. In this paper, we present potential solution ideas that are currently investigated by the European EMC² research project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneider, D., Trapp, M.: Conditional Safety Certification of Open Adaptive Systems. ACM Trans. Auton. Adapt. Syst. 8(2), Article 8, 20 pages (2013)

    Google Scholar 

  2. Althammer, E., Schoitsch, E., Eriksson, H., Vinter, J.: The DECOS Concept of Generic Safety Cases - A Step towards Modular Certification. In: Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, pp. 537–545 (2009)

    Google Scholar 

  3. Schneider, D., Trapp, M.: Conditional Safety Certificates in Open Systems. In: Proceedings of the 1st Workshop on Critical Automotive Applications: Robustness & Safety (CARS 2010). ACM (2010)

    Google Scholar 

  4. Fenn, J., Hawkins, R., Kelly, T.P., Williams, P.: Safety Case Composition Using Contracts – Refinements Based on Feedback from an Industrial Case Study. In:15th Safety Critical Systems Symposium (2007)

    Google Scholar 

  5. Bate, I., Kelly, T.P.: Architectural considerations in the certification of modular systems. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol. 2434, pp. 321–333. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. IEC 61508, Ed. 2.0, 2010, Part 1-7. Functional safety of electrical/electronic/programmable electronic safety related systems, International Electrotechnical Commission

    Google Scholar 

  7. Kelly, T.P, Concepts and Principles of Compositional Safety Cases. COMSA/2001/1/1, Research Report commissioned by QinetiQ (2001)

    Google Scholar 

  8. Rushby, J.: Modular certification. NASA Contractor Report CR-2002-212130, NASA Langley Research Center (2002)

    Google Scholar 

  9. Rushby, J.: Just-in-Time Certification. In: proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007), pp. 15–24 (2007)

    Google Scholar 

  10. Rushby, J.: Runtime certification. In: Leucker, M. (ed.) RV 2008. LNCS, vol. 5289, pp. 21–35. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Schneider, D., Trapp, M.: A Safety Engineering Framework for Open Adaptive Systems. In: Proc. of the Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO (2011)

    Google Scholar 

  12. Moore, G.E.: Cramming more components onto integrated circuits. Electronics Magazine, 4 (1965) ISSIN 0883-4989

    Google Scholar 

  13. Kelly, T.: Using software architecture techniques to support the modular certification of safety-critical systems. In: Proceedings of the Eleventh Australian Workshop on Safety Critical Systems and Software, SCS 2006, vol. 63, pp. 53–65. Australian Computer Society, Inc., Darlinghurst (2006)

    Google Scholar 

  14. IEC 62443: Industrial communication networks - Network and system security. International Electrotechnical Commission

    Google Scholar 

  15. ISO/IEC:27002: Information technology - security techniques - Code of practice for information security management. International Organization for Standardization (ISO), International Electrotechnical Commission (IEC)

    Google Scholar 

  16. ISO/IEC 27005, Information technology — Security techniques — Information security risk management. International Organization for Standardization (ISO), International Electrotechnical Commission, IEC (2008)

    Google Scholar 

  17. SafeCer (Safety Certification Safety Certification of Software-intensive Systems with Reusable Components), ARTEMIS project n° 269265/295373 (pSafeCer/nSafeCer), http://www.safecer.eu

  18. 7. OPENCOSS (Open Platform for EvolutioNary Certification Of Safety-critical Systems), European Integrated Project in FP7 , http://www.opencoss-project.eu

  19. ISO 26262 (2011/2012), Part 1- 10, “Road vehicles – functional safety”

    Google Scholar 

  20. Schoitsch, E.: Safety and/vs. Security: Towards a System Engineering approach for Trust? In: Proceedings of ISSC 2013 (31st International Systems Safety Conference), IEEE Conference Proceedings, Boston, USA, August 12-16, System Safety Society, Boston (2013), Paper #134 in electronic proceedings, ISBN 978-0-9858710-1-7

    Google Scholar 

  21. IEC 62741/Ed1, 2013: Reliability of systems, equipment and components. Guide to the demonstration of dependability requirements. The dependability case

    Google Scholar 

  22. IEC/PAS 62814/Ed1, 2013: Dependability of Software Products Containing Reusable Components – Guidance for Functionality and Tests

    Google Scholar 

  23. ISO 15408, 2009: Information technology – Security techniques – Evaluation criteria for IT security

    Google Scholar 

  24. SESAMO (Security and Safety Modelling), http://www.sesamo-project.eu

  25. Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 311–326. Springer, Heidelberg (2014)

    Google Scholar 

  26. Steiner, M., Liggesmeyer, P.: Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System. In: SAFECOMP 2013 - Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)

    Google Scholar 

  27. Roth, M., Liggesmeyer, P.: Modeling and Analysis of Safety-Critical Cyber Physical Systems using State/Event Fault Trees. In: SAFECOMP 2013 - Workshop DECS (2013)

    Google Scholar 

  28. ACROSS (Artemis project: ARTEMIS CROSS-Domain Architecture), http://www.across-project.eu

  29. Ebert, C., Jones, C.: Embedded Software: Facts, Figures and Future, pp. 42–52. IEEE Computer Society (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Schneider, D., Armengaud, E., Schoitsch, E. (2014). Towards Trust Assurance and Certification in Cyber-Physical Systems. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8696. Springer, Cham. https://doi.org/10.1007/978-3-319-10557-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10557-4_21

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10556-7

  • Online ISBN: 978-3-319-10557-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics