Skip to main content

Cyber-Physical Systems: Imminent Challenges

  • Conference paper
Large-Scale Complex IT Systems. Development, Operation and Management (Monterey Workshop 2012)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7539))

Included in the following conference series:

Abstract

A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical Systems are herein understood in a very broad sense as the integration of embedded systems with global networks such as the Internet. The survey aims at deepening understanding the impact of those systems at technological and economical level as well as at political and sociological level. The goal of the study is to collect arguments for decision makers both in business and politics to take actions in research, legislation and business development.

This work has been partially sponsored by the BMBF project “Integrierte Forschungsagenda Cyber-Physical Systems” under the patronage of acatech, the National Academy of Science and Engineering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Achatz, R., Beetz, K., Broy, M., Dämbkes, H., Damm, W., Grimm, K., Liggesmeyer, P.: Nationale Roadmap Embedded Systems. ZVEI (Zentralverband Elektrotechnik und Elektronikindustrie e. V.), Kompetenzzentrum Embedded Software & Systems, Frankfurt/Main (December 2009), https://www.zvei.org/fileadmin/user_upload/Forschung_Bildung/NRMES.pdf

  2. Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors – a survey. Technical Report UCAM-CL-TR-641, University of Cambridge, Computer Laboratory (August 2005), http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-641.pdf

  3. Armenio, F., Barthel, H., Dietrich, P., Duker, J., Floerkemeier, C., Garrett, J., Harrison, M., Hogan, B., Mitsugi, J., Preishuber-Pfluegl, J., Ryaboy, O., Sarma, S., Suen, K.K., Williams, J.: The EPCglobal Architecture Framework. In: Traub, K. (ed.) Technical report, GS1 (2010) (final version 1.4 approved December 15, 2010), http://www.gs1.org/gsmp/kc/epcglobal/architecture/architecture_1_4-framework-20101215.pdf

  4. Avižienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)

    Article  Google Scholar 

  5. Arbeitskreis Multicore. Relevanz eines Multicore-Ökosystems für künftige Embedded Systems: Positionspapier zur Bedeutung, Bestandsaufnahme und Potentialermittlung der Multicore-Technologie für den Industrie- und Forschungsstandort Deutschland (December 2011), http://www.bicc-net.de/workspace/uploads/subfeatures/downloads/positionspapier_multicore_oekosys-1323952449.pdf

  6. AUTOSAR – Demonstration of Integration of AUTOSAR into a MM/T/HMI ECU V1.0.0. Technical report, AUTOSAR (AUTomotive Open System ARchitecture) (2010), http://www.autosar.org/download/informaldocuments/AUTOSAR_TR_IntegrationintoMMTHMIECU.pdf

  7. Aziz, R.A., Zowghi, D., McBride, T.: Towards a Classification of Requirements Relationships. In: 21st International Conference on Software Engineering & Knowledge Engineering (SEKE 2009, Proceedings), pp. 26–32. Knowledge Systems Institute Graduate School (2009)

    Google Scholar 

  8. Baumgart, A., Böde, E., Büker, M., Damm, W., Ehmen, G., Gezgin, T., Henkler, S., Hungar, H., Josko, B., Oertel, M., Peikenkamp, T., Reinkemeier, P., Stierand, I., Weber, R.: Architecture modeling. Technical report, Oldenburger Forschungs- und Entwicklungsinstitut für Informatik (OFFIS) (March 2011)

    Google Scholar 

  9. Bernon, C., Chevrier, V., Hilaire, V., Marrow, P.: Applications of self-organising multi-agent systems: An initial framework for comparison. Informatica 30(1), 73–82 (2006)

    Google Scholar 

  10. Berger, T.: Softwareproduktlinien-Entwicklung – Domain Engineering: Konzepte, Probleme und Lösungsansätze. Diplomarbeit, Universität Leipzig (April 2007)

    Google Scholar 

  11. Broy, M., Geisberger, E., Cengarle, M.V., Keil, P., Niehaus, J., Thiel, C., Thönnißen-Fries, H.-J.: Cyber-Physical Systems: Innovationsmotor für Mobilität, Gesundheit, Energie und Produktion. acatech BEZIEHT POSITION, vol. 8. Springer, Berlin (2012), http://www.springer.com/computer/book/978-3-642-27566-1

    Google Scholar 

  12. Broy, M., Geisberger, E., Kazmeier, J., Rudorfer, A., Beetz, K.: Ein Requirements-Engineering-Referenzmodell. Informatik Spektrum 30(3), 127–142 (2007)

    Article  Google Scholar 

  13. Brand, L., Hülser, T., Grimm, V., Zweck, A.: Internet der Dinge: ”Ubersichtsstudie. Technical report, Zukünftige Technologien Consulting der VDI Technologiezentrum GmbH (March 2009), http://www.vdi.de/fileadmin/vdi_de/redakteur/dps_bilder/TZ/2009/Band%2080_IdD_komplett.pdf

  14. Bishop, C.: Pattern Recognition and Machine Learning. Springer, New York (2007), Corr. 2nd printing

    Google Scholar 

  15. Brecher, C., Kozielski, S., Schapp, L.: Integrative Produktionstechnik für Hochlohnländer, pp. 47–70. Springer, Berlin (2011), http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Publikationen/acatech_diskutiert/acatech_diskutiert_Wertschoepfung_WEB.pdf

    Book  Google Scholar 

  16. Brands, S. (ed.): Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy. MIT Press, Cambridge (2000)

    Google Scholar 

  17. Bussmann, S., Schild, K.: Self-Organizing Manufacturing Control: An Industrial Application of Agent Technology. In: Fourth International Conference on Multi Agent Systems (Proceedings), pp. 87–94 (2000)

    Google Scholar 

  18. Leitfaden Informationssicherheit – IT-Grundschutz kompakt. Technical Report BSI-Bro10/311, Referat 114 Sicherheitsmanagement und IT-Grundschutz, Bundesamt für Sicherheit in der Informationstechnik (2010), https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Leitfaden/GS-Leitfaden_pdf.pdf?__blob=publicationFile

  19. Cavoukian, A.: Privacy by Design. Technical report, Office of the Information and Privacy Commissioner, Ontario (2009), http://www.privacybydesign.ca/content/uploads/2010/03/PrivacybyDesignBook.pdf

  20. Definition and exemplification of RSL and RMM. Deliverable D_SP2_R2.1_M1, Cost-efficient methods and processes for safety relevant embedded systems (CESAR) (April 2010), http://www.cesarproject.eu/fileadmin/user_upload/CESAR_D_SP2_R2.1_M1_v1.000.pdf

  21. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analyses of Automotive Attack Surfaces. In: 20th USENIX Security Symposium (Proceedings), pp. 77–92 (2011), http://www.autosec.org/pubs/cars-usenixsec2011.pdf

  22. Mont, M.C., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: 14th International Workshop on Database and Expert Systems Applications (DEXA 2003, Proceedings), pp. 377–382. IEEE Computer Society (September 2003), Long version http://www.hpl.hp.com/techreports/2003/HPL-2003-49.pdf

  23. Cusumano, M., Nobeoka, K.: Thinking Beyond Lean: how multi-project management is transforming product development at Toyota and other companies. In: MIT International Motor Vehicle Program. Free Press (May 2008)

    Google Scholar 

  24. Cyber-Physical Systems Summit “Holistic Approaches to Cyber-Physical Integration”. Report, CPS Week (April 2008), http://iccps2012.cse.wustl.edu/_doc/CPS_Summit_Report.pdf

  25. Capurro, R., Scheule, R., Hausmanninger, T. (eds.): Vernetzt gespalten: Der Digital Divide in ethischer Perspektive. Wilhelm Fink, Paderborn (2004)

    Google Scholar 

  26. Cusumano, M.: Staying Power: Six Enduring Principles for Managing Strategy and Innovation in an Uncertain World. Oxford University Press, Oxford (2010)

    Google Scholar 

  27. Christaller, T., Wehner, J. (eds.): Autonome Maschinen. Westdeutscher Verlag, Wiesbaden (2003)

    Google Scholar 

  28. Cramer, S., Weyer, J.: Interaktion, Risiko und Governance in hybriden Systemen. In: Dolata, Werle [DW07], pp. 267–286, http://www.techniksoziologie-dortmund.de/Mitarbeiter/Cramer/K%C3%B6lnpdf.pdf

  29. Dmitriev, S.: Language Oriented Programming: The Next Programming Paradigm. onBoard (November 1, 2004), http://www.jetbrains.com/mps/docs/Language_Oriented_Programming.pdf

  30. Department of Defense Architecture Framework Version 2.0 (DoDAF V2.0) – Volume 1: Introduction, Overview, and Concepts – Manager’s Guide. Technical report, Department of Defense Chief Information Officer (May 2009), http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%201.pdf

  31. Department of Defense Architecture Framework Version 2.0 (DoDAF V2.0) – Volume 2: Architectural Data and Models – Architect’s Guide. Technical report, Department of Defense Chief Information Officer (May 2009), http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%202.pdf

  32. Department of Defense Architecture Framework Version 2.0 (DoDAF V2.0) – Volume 3: DoDAF Meta-model, Physical Exchange Specification – Developer’s Guide. Technical report, Department of Defense Chief Information Officer (May 2009), http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%203.pdf

  33. Drath, R. (ed.): Datenaustausch in der Anlagenplanung mit AutomationML: Integration von CAEX, PLCopen XML und COLLADA. VDI-Buch. Springer, Heidelberg (2010)

    Google Scholar 

  34. Dolata, U., Werle, R. (eds.): Gesellschaft und die Macht der Technik: Sozioökonomischer und institutioneller Wandel durch Technisierung. Schriften aus dem Max-Planck-Institut für Gesellschaftsforschung Köln, vol. 58. Campus Verlag, Frankfurt (2007)

    Google Scholar 

  35. Endsley, M., Bolte, B., Jones, D.: Designing for Situation Awareness: An Approach to User-Centered Design. CRC Press (July 2003)

    Google Scholar 

  36. European Convention on Human Rights (Convention for the Protection of Human Rights and Fundamental Freedoms. Article 8 “Right to respect for private and family life” (as amended by the provisions of Protocol No. 14 (CETS no. 194) as from its entry into force on June 1, 2010 (November 4, 1950), http://www.echr.coe.int/NR/rdonlyres/D5CC24A7-DC13-4318-B457-5C9014916D7A/0/CONVENTION_ENG_WEB.pdf

  37. European Community. Directive 95/49/DC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities L 281, 31–50 (1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:1995:281:0031:0050:EN:PDF

  38. European Community. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities L 201, 37–47 (2002), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2002:201:0037:0047:EN:PDF

  39. European Union. Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users’ rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation […] for the enforcement of consumer protection laws. Official Journal of the European Union L 337, 11–36 (2009), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:337:0011:0036:EN:PDF

  40. Fischer, K., Florian, M., Malsch, T. (eds.): Socionics. LNCS (LNAI), vol. 3413. Springer, Heidelberg (2005)

    Google Scholar 

  41. Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.): Privacy and Identity Management for Life. IFIP AICT, vol. 352. Springer, Heidelberg (2011)

    Google Scholar 

  42. Fikes, R., Nilsson, N.: STRIPS: A new approach to the application of theorem proving to problem solving. Artificial Intelligence 2(3-4), 189–208 (1971)

    Article  MATH  Google Scholar 

  43. Garvin, D.: What does “product quality” really mean? MIT Sloan Management Review, 25–45 (1984)

    Google Scholar 

  44. Geisberger, E., Broy, M., Berenbach, B., Kazmeier, J., Paulish, D., Rudorfer, A.: Requirements Engineering Reference Model (REM). Technical Report TUM-I0618, Technische Universität München (November 2006)

    Google Scholar 

  45. Geisberger, E., Broy, M., Cengarle, M.V., Keil, P., Niehaus, J., Thiel, C., Thönnißen-Fries, H.-J.: agendaCPS: Integrierte Forschungsagenda Cyber-Physical Systems. Springer, Berlin (2012), http://www.fortiss.org/fileadmin/user_upload/downloads/agendaCPS_Studie.pdf

    Google Scholar 

  46. Gifford, C. (ed.): The Hitchhiker’s Guide to Manufacturing Operations Management: ISA-95 Best Practices Book 1.0. ISA (2007)

    Google Scholar 

  47. Roadmap “Prozess-Sensoren 2015+”. Technical report, NAMUR und VDI/VDE-Gesellschaft Mess- und Automatisierungstechnik (GMA) (November 2009), http://www.vdi.de/fileadmin/vdi_de/redakteur_dateien/gma_dateien/Prozess-Sensoren_2015+.pdf

  48. Geib, C., Mourão, K., Petrick, R., Pugeault, N., Steedman, M., Krueger, N., Wörgötter, F.: Object Action Complexes as an Interface for Planning and Robot Control. In: Humanoids 2006 Workshop Towards Cognitive Humanoid Robots, Proceedings (2006)

    Google Scholar 

  49. Garside, R., Pighetti, J.: Integrating modular avionics: A new role emerges. Aerospace and Electronic Systems Magazine (IEEE) 24(3), 31–34 (2009)

    Article  Google Scholar 

  50. Geisberger, E., Schätz, B.: Modellbasierte Anforderungsanalyse mit AutoRAID. Informatik – Forschung und Entwicklung 21(3-4), 231–242 (2007)

    Article  Google Scholar 

  51. Hirvonen, J., Sallinen, M., Maula, H., Suojanen, M.: Sensor Networks Roadmap. Research notes 2381, VTT Tiedotteita (2007), http://www.vtt.fi/inf/pdf/tiedotteet/2007/T2381.pdf

  52. Hansen, M., Thiel, C.: Cyber-Physical Systems und Privatsphären-Schutz. Datenschutz und Datensicherheit (DuD) 36(1) (2012)

    Google Scholar 

  53. Huang, J.-D.: Kinerehab: a kinect-based system for physical rehabilitation: a pilot study for young adults with motor disabilities. In: 13th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS 2011, Proceedings), pp. 319–320 (2011)

    Google Scholar 

  54. Hogg, S., Vyncke, E.: IPv6 Security: Information assurance for the next-generation Internet Protocol. Cisco Press, Indianapolis (2008)

    Google Scholar 

  55. Heuser, L., Wahlster, W. (eds.): Internet der Dienste. acatech DISKUTIERT. Springer, Berlin (2011), http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Publikationen/acatech_diskutiert/acatech_Diskutiert_Internet-der-Dienste_WEB_02.pdf

    Google Scholar 

  56. Functional safety of electrical/electronic/programmable electronic safety-related systems. Technical Report IEC/TR 61508 Part 0-7, International Electrotechnical Commission (IEC) (2010)

    Google Scholar 

  57. Road vehicles – Functional safety – Part 1: Vocabulary. Technical Report ISO 26262-1:2011, International Organization for Standardization (ISO) (November 2011), http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=43464

  58. Joordens, M., Shaneyfelt, T., Eega, S., Jaimes, A., Jamshidi, M.: Applications and prototype for system of systems swarm robotics. In: Systems, Man and Cybernetics, 2008 (SMC 2008, Proceedings) (2008)

    Google Scholar 

  59. Kleinknecht, A.: Are there Schumpeterian waves of innovations? Cambridge Journal of Economics 14(1), 81–92 (1990)

    Google Scholar 

  60. Krewitt, W., Nienhaus, K., Roloff, N., Weeber, R., Reeg, M., Weimer-Jehle, W., Wassermann, S., Fuchs, G., Kast, T., Schmidt, B., Leprich, U., Hauser, E.: Analyse von Rahmenbedingungen für die Integration erneuerbarer Energien in die Strommärkte auf der Basis agentenbasierter Simulation (Abschlussbericht). Technical report, Deutsches Zentrum für Luft- und Raumfahrt e.V. (DLR), Interdisziplinärer Forschungsschwerpunkt Risiko und nachhaltige Technikentwicklung (ZIRN), Thomas Kast Simulation Solutions, Institut für ZukunftsEnergieSysteme (IZES), gefördert mit Mitteln des Bundesministeriums für Umwelt, Naturschutz und Reaktorsicherheit unter dem Förderkennzeichen 0325015 (February 2011), http://www.dlr.de/Portaldata/41/Resources/dokumente/st/AMIRIS-Pilotvorhaben.pdf

  61. Koukoumidis, E., Peh, L.-S., Martonosi, M.: SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory, pp. 127–140. ACM (2011)

    Google Scholar 

  62. Kotonya, G., Sommerville, I.: Requirements Engineering: Processes and Techniques. Wiley (September 1998)

    Google Scholar 

  63. Kalfoglou, Y., Schorlemmer, M.: Ontology mapping: The state of the art. The Knowledge Engineering Review 18(1), 1–31 (2003)

    Article  Google Scholar 

  64. Könings, B., Schaub, F., Weber, M., Kargl, F.: Towards territorial privacy in smart environments. In: Genesereth, M., Vogl, R., Williams, M.-A. (eds.) Intelligent Information Privacy Management Symposium (AAAI Spring Symposium, Proceedings), pp. 113–118, Technical Report SS-10-05. Stanford University (March 2010), http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1043/1496

  65. Latour, B.: Science in Action: How to Follow Scientists and Engineers through Society? Open University Press (1987)

    Google Scholar 

  66. Lenat, D.: From 2001 to 2001: Common Sense and the Mind of HAL, pp. 305–332. MIT Press, Cambridge (1997)

    Google Scholar 

  67. Leveson, N.: Safeware: System Safety and Computers. Addison-Wesley (September 1995)

    Google Scholar 

  68. Li, Y., Li, J., Yang, Y., Li, M.: Requirement-Centric Traceability for Change Impact Analysis: A Case Study. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 100–111. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  69. Leveson, N., Denise Pinnel, L., Sandys, S.D., Koga, S., Reese, J.D.: Analyzing Software Specifications for Mode Confusion Potential. In: Workshop on Human Error and System Development (Proceedings), pp. 132–146 (March 1997), http://sunnyday.mit.edu/papers/glascow.pdf

  70. Marchetti, C.: Society as a Learning System: Discovery, Invention, and Innovation Cycles Revisited. Technological Forecasting and Social Change 18(4), 267–282 (1980)

    Article  MathSciNet  Google Scholar 

  71. Mattern, F. (ed.): Total vernetzt: Szenarien einer informatisierten Welt (7. Berliner Kolloquium der Gottlieb Daimler- und Karl Benz-Stiftung, Tagungsband). Xpert Press, Springer, Heidelberg (2003)

    Google Scholar 

  72. International Workshop on Multiple Classifier Systems (MCS, Proceedings). LNCS. Springer (2000-2011)

    Google Scholar 

  73. Mahnke, W., Leitner, S.-H., Damm, M.: OPC Unified Architecture. Springer (2010)

    Google Scholar 

  74. Marrón, P.J., Minder, D. (eds.): Embedded WiSeNts Research Roadmap. Logos Verlag, Berlin (2006), ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/BOOK-2006-03/BOOK-2006-03.pdf

    Google Scholar 

  75. Pilot gaze performance in critical flight phases and during taxiing. Technical report, Deutsches Zentrum für Luft- und Raumfahrt (DLR), Results from the Project MOSES (More Operational Flight Security through increased Situation Awareness) (July 2008), http://www.dlr.de/fl/en/Portaldata/14/Resources/dokumente/abt27/MOSES_results.pdf

  76. Monostori, L., Váncza, J., Kumara, S.R.T.: Agent-Based Systems for Manufacturing. CIRP Annals - Manufacturing Technology 55(2), 697–720 (2006)

    Article  Google Scholar 

  77. NATO Architecture Framework Version 3.0 (NAF V2.0). Technical report, North Atlantic Treaty Organization (NATO) (November 2007), http://www.nhqc3s.nato.int/ARCHITECTURE/_docs/NAF_v3/ANNEX1.pdf

  78. Norman, D.: Dinge des Alltags: Gutes Design und Psychologie für Gebrauchsgegenstände. Campus Verlag (March 1996)

    Google Scholar 

  79. Osborne, M.: An Introduction to Game Theory. Oxford University Press (August 2003)

    Google Scholar 

  80. Petrick, R.P.A., Bacchus, F.: Reasoning with Conditional Plans in the Presence of Incomplete Knowledge. In: ICAPS 2003 Workshop on Planning under Uncertainty and Incomplete Information’ (Proceedings), Trento, pp. 96–102. Università di Trento (June 2003)

    Google Scholar 

  81. Pohl, K., Böckle, G., van der Linden, F.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer (August 2005)

    Google Scholar 

  82. Pohl, K., Böckle, G., van der Linden, F.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer (2005)

    Google Scholar 

  83. Rabaey, J.: A brand new wireless day, p. 1. IEEE Computer Society Press, Los Alamitos (2008)

    Google Scholar 

  84. Rammert, W.: Technik in Aktion: Verteiltes Handeln in soziotechnischen Konstellationen. In: Christaller, Wehner [CW03], pp. 289–315

    Google Scholar 

  85. Rost, M., Bock, K.: Privacy By Design und die Neuen Schutzziele. Datenschutz und Datensicherheit (DuD) 35(1), 30–35 (2011)

    Article  Google Scholar 

  86. Roussopoulos, M., Beslay, L., Bowden, C., Finocchiaro, G., Hansen, M., Langheinrich, M., Le Grand, G., Tsakona, K.: Technology-induced challenges in Privacy & Data Protection in Europe. Technical report, Ad Hoc Working Group on Privacy & Technology, European Network and Information Security Agency (ENISA) (October 2008), http://www.enisa.europa.eu/act/rm/files/deliverables/technology-induced-challenges-in-privacy-data-protection-in-europe/at_download/fullReport

  87. Rubin, D., Lewis, S., Mungall, C., Misra, S., Westerfield, M., Ashburner, M., Sim, I., Chute, C., Solbrig, H., Storey, M.-A., Smith, B., Day-Richter, J., Noy, N., Musen, M.: National Center for Biomedical Ontology: Advancing Biomedicine through Structured Organization of Scientific Knowledge. OMICS: A Journal of Integrative Biology 10(2), 185–198 (2006), http://www.liebertonline.com/doi/pdf/10.1089/omi.2006.10.185

    Article  Google Scholar 

  88. Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice Hall (December 2009)

    Google Scholar 

  89. Rost, M., Pfitzmann, A.: Datenschutz-Schutzziele – revisited. Datenschutz und Datensicherheit (DuD) 33(6), 353–358 (2009)

    Article  Google Scholar 

  90. Rammert, W., Schulz-Schaeffer, I. (eds.): Können Maschinen handeln?: Soziologische Beiträge zum Verhältnis von Mensch und Technik. Campus Wissenschaft, Frankfurt/Main (2002)

    Google Scholar 

  91. Rammert, W., Schulz-Schaeffer, I.: Technik und Handeln – Wenn soziales Handeln sich auf menschliches Verhalten und technische Abläufe verteilt. In: Rammert, W., Schulz-Schaefer, I. [RSS02a], pp. 11–64

    Google Scholar 

  92. Sadri, F.: Logic-Based Approaches to Intention Recognition. In: Chong, N.-Y., Mastrogiovanni, F. (eds.) Handbook of Research on Ambient Intelligence and Smart Environments: Trends and Perspectives, pp. 346–375. IGI Global (May 2011)

    Google Scholar 

  93. Stankovic, J., Abdelzaher, T., Lu, C., Sha, L., Hou, J.: Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE Real-Time Systems 91(7), 1002–1022 (2003)

    Google Scholar 

  94. Sundermeyer, K., Bussmann, S.: Einführung der Agententechnologie in einem produzierenden Unternehmen – Ein Erfahrungsbericht. Wirtschaftsinformatik 43(2), 135–142 (2001)

    Article  Google Scholar 

  95. Sage, A., Cuppan, C.: On the Systems Engineering and Management of Systems of Systems and Federations of Systems. Information-Knowledge-Systems Management 2(4), 325–345 (2001)

    Google Scholar 

  96. Schätz, B.: AutoFocus – Mastering the Complexity. In: Kordon, F., Lemoine, M. (eds.) Formal Methods for Embedded Distributed Systems: How to Master the Complexity, ch. 7, pp. 215–257. Kluwer Academic Publishers (2004)

    Google Scholar 

  97. Schaar, P.: Das Ende der Privatsphäre: Der Weg in die ”Uberwachungsgesellschaft. C. Bertelsmann (September 2007)

    Google Scholar 

  98. Schulz, A.: Driving without awareness – Folgen herabgesetzter Aufmerksamkeit im Stras̈enverkehr. VDM Verlag Dr. Müller (2007)

    Google Scholar 

  99. Schwan, B.: Grüne Welle dank Smartphone. Technical report, Technology Review (Oktober 7, 2011), http://www.heise.de/tr/artikel/Gruene-Welle-dank-Smartphone-1353408.html

  100. Šmihula, D.: Waves of technological innovations and the end of the information revolution. Journal of Economics and International Finance 2(4), 58–67 (2010)

    Google Scholar 

  101. Schleipen, M., Münnemann, A., Sauer, O.: Interoperabilität von Manufacturing Execution Systems (MES): Durchgängige Kommunikation in unterschiedlichen Dimensionen der Informationstechnik in produzierenden Unternehmen. Automatisierungstechnik 59(7), 413–425 (2011), http://www.iosb.fraunhofer.de/servlet/is/4893/auto.2011.0936.pdf?command=downloadContent&filename=auto.2011.0936.pdf

    Article  Google Scholar 

  102. Special section: Socionics. Journal of Artificial Societies and Social Simulation (January 2007), http://jasss.soc.surrey.ac.uk/10/1/contents.html

  103. Stone, E., Skubic, M.: Evaluation of an Inexpensive Depth Camera for Passive In-Home Fall Risk Assessment. In: 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2011, Proceedings), pp. 71–77 (2011) (Best Paper Award), http://eldertech.missouri.edu/files/Papers/StoneE/Evaluation%20of%20an%20Inexpensive%20Depth%20Camera.pdf

  104. Silverberg, G., Verspagen, B.: Breaking the waves: a Poisson regression approach to Schumpeterian clustering of basic innovations. Cambridge Journal of Economics 27(5), 671–693 (2003)

    Article  Google Scholar 

  105. Thiel, C.: Multiple classifier systems incorporating uncertainty. Verlag Dr. Hut, München (2010)

    Google Scholar 

  106. TOGAF Version 9, Enterprise Edition. Technical report, The Open Group (February 2009), https://www2.opengroup.org/ogsys/jsp/publications/PublicationDetails.jsp?catalogno=g091

  107. Webb, A.: Statistical Pattern Recognition, 2nd edn. John Wiley & Sons (October 2002)

    Google Scholar 

  108. Weiss, G. (ed.): Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press (July 2000)

    Google Scholar 

  109. Westin, A.F.: Privacy and Freedom, 1st edn. Atheneum, New York (1967)

    Google Scholar 

  110. Weyer, J.: Die Zukunft des Autos – das Auto der Zukunft. Wird der Computer den Menschen ersetzen? Soziologische Arbeitspapiere 14, Universität Dortmund (March 2006), http://www.wiso.tu-dortmund.de/wiso/is/Medienpool/Arbeitspapiere/ap-soz14.pdf

  111. Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: 7th International Conference on Wireless On-demand Network Systems and Services (WONS 2010, Proceedings), pp. 176–183. IEEE Computer Society Press (2010)

    Google Scholar 

  112. Wooldridge, M.: An Introduction to Multi Agent Systems, 2nd edn. John Wiley & Sons (May 2009)

    Google Scholar 

  113. Wood, A., Stankovic, J.: Security of Distributed, Ubiquitous, and Embedded Computing Platforms. In: Voeller, J. (ed.) Wiley Handbook of Science and Technology for Homeland Security, John Wiley & Sons (March 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Broy, M., Cengarle, M.V., Geisberger, E. (2012). Cyber-Physical Systems: Imminent Challenges. In: Calinescu, R., Garlan, D. (eds) Large-Scale Complex IT Systems. Development, Operation and Management. Monterey Workshop 2012. Lecture Notes in Computer Science, vol 7539. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34059-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34059-8_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34058-1

  • Online ISBN: 978-3-642-34059-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics