Information Technology Reference
In-Depth Information
with the Internet-based cyber world in order to create qualitatively new global
functionalities.
This synergy appears at first as an upper layer of monitoring, data pro-
cessing and control. However new opportunities are provided by the evolvabil-
ity of applications both in the terms of functional and dependability driven
adaptation. This way, bringing the formerly pure infrastructure oriented self-
* paradigms to embedded systems will become to a reality in the nearest
future.
At the same time, the new level of openness absent previously in tradi-
tional closed world embedded system designs exposes even critical systems to
security intrusions. Formal methods are able co-modeling safety and security
faults in order to help robust architectures simultaneously resisting safety
and security risks.
Search WWH ::




Custom Search