A HOLISTIC VIEW AT DEPENDABLE EMBEDDED SOFTWARE-INTENSIVE SYSTEMS

被引:0
作者
Schoitsch, Erwin [1 ]
机构
[1] ARC, Vienna, Austria
来源
IDIMT-2008: MANAGING THE UNMANAGEABLE | 2008年 / 25卷
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Embedded software-intensive systems are already almost "omnipresent" - and key to most of the innovations today and in the future in almost all domains of our life. Reliance on their services became a critical issue, although humans are very well able to adapt to unsatisfactory performance and reliability to a certain extend - today's Windows-PCs. SPAM-emails and Interned are very good examples. Dependability as a complex "umbrella"-property is key to massive, ubiquitous deployment and use of embedded smart systems, including sub-properties such as safety, reliability, availability, security, maintainability, survivability. These properties are, depending on the application, not independent: they can he complimentary, or even contradictory. Embedded systems are completely, integrated in their environment ("hidden" computing"), and in man-v cases integrated in networks of different connectivity, interacting with each other, with humans and environment via various means. They consist of control units, sensors, actuators, "intelligence" ("smart systems") - to serve our needs and fulfil their tasks in a safe and reliable manner. Applications include critical systems such as sea, ground and air transport, medical devices, industrial and power plant control, surveillance and monitoring, emergency systems, other working environments, and less critical ones for communication, info-/edutainment and entertainment. The paper will demonstrate that mass deployment of networked, dependable systems implies a new, holistic system view on critical systems, and how the challenges should be addressed by proper system assessment and evaluation, architecture, design, development, validation and maintenance.
引用
收藏
页码:321 / 344
页数:24
相关论文
共 30 条
[1]  
ALTHAMMER E, 2008, P IEEE C
[2]  
[Anonymous], 739 U NEWC TYN DEP C
[3]  
[Anonymous], DESIGNING SOFTWARE I
[4]  
[Anonymous], SEC CAP PROF IND CON
[5]  
[Anonymous], LIFE CYCLE MANAGEMEN
[6]  
[Anonymous], 61508 IEC
[7]  
[Anonymous], TIME TRIGGERED ARCHI
[8]  
BEAVER C, 2002, KEY MANAGEMENT SCADA
[9]  
*CAA, REP DEV SEC REQ CAA
[10]  
DONHOFFER D, 2001, P JOINT EU WORKSH AD