mdh.sePublications
Change search
Refine search result
1 - 32 of 32
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Ahmed, Mobyen Uddin
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lindén, Maria
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An Overview on the Internet of Things for Health Monitoring Systems2016In: 2nd EAI International Conference on IoT Technologies for HealthCare HealthyIoT2015, 2016, Vol. 169, p. 429-436Conference paper (Refereed)
    Abstract [en]

    The aging population and the increasing healthcare cost in hospitals are spurring the advent of remote health monitoring systems. Advances in physiological sensing devices and the emergence of reliable low-power wireless network technologies have enabled the design of remote health monitoring systems. The next generation Internet, commonly referred to as Internet of Things (IoT), depicts a world populated by devices that are able to sense, process and react via the Internet. Thus, we envision health monitoring systems that support Internet connection and use this connectivity to enable better and more reliable services. This paper presents an overview on existing health monitoring systems, considering the IoT vision. We focus on recent trends and the development of health monitoring systems in terms of: (1) health parameters, (2) frameworks, (3) wireless communication, and (4) security issues. We also identify the main limitations, requirements and advantages within these systems.

  • 2. Avdagic, Zikrija
    et al.
    Boskovic, Dusanka
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering.
    Code Evaluation Using Fuzzy Logic2008Conference paper (Refereed)
    Abstract [en]

    This paper presents application of a fuzzy logic based system to automatically evaluate the

    maintainability of code. Code evaluation is accomplished by rating its quality provided with bad smells in

    code as inputs. Straightforward bad smells with existing software metrics tools are selected as inputs:

    duplicated code, long methods, large classes having a high cyclomatic complexity, or a large number of

    parameters and temporary fields. Removing these bad smells can result in significant code improvements

    concerning readability and maintainability. However, the precise definition of attributes like small, long, large

    or high is not clear, and their identification is rather subjective. Fuzzy logic values are suitable for capturing

    partial correspondence to attributes and fuzzy rules model have been used to describe the relation between bad

    smells and code quality. Model supporting the experimental evaluation of the fuzzy based code evaluation is

    implemented in Java.

    Key-Words: - Fuzzy Logic, Reasoning Systems, Refactoring, Bad Smells

  • 3.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Risk and Threat Assessment Approaches Overview in Autonomous Systems of Systems2017In: The 26th International Conference on Information, Communication and Automation Technologies ICAT2017, 2017, p. 1-6Conference paper (Refereed)
    Abstract [en]

    Systems of systems (SoS) have been introduced in early 1990s in air traffic control domain, defense and information technologies. Systems like this contain a set of components, being systems itself, with constituent components retaining operational independence. The definition and configuration of SoS have evolutionary nature and emergent behavior is one of the many important characteristics to be mentioned. Over the past ten years fast technological and industrial advances in the domain of autonomous and cooperating systems started to occur, which created new opportunities to use the benefits of SoS. In the near future, fully autonomous and cooperating systems are expected to become our reality and increase the production efficiency, while decreasing the human effort in harmful environments. There exist the need to make sure that critical properties of SoS, such as safety and security are guaranteed as a joint effort, since it is not sufficient anymore to address these properties independently in the development process. In this paper an overview of the most common approaches and methods used to provide reasoning about joint safety and security is provided, as well as a check of the latest updates in standards related to these properties

  • 4.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. IS (Embedded Systems).
    Risk Assessment in Autonomous System of Systems - A Review2016Report (Other academic)
    Abstract [en]

    We are witnessing a fast technological and industrial advances in the domain of autonomous and cooperating systems. It is believed that in the near future, fully autonomous and cooperating systems are going to become our reality, with helping to increase the production efficiency and to decrease (potentially completely replace) human effort in harmful environments. In order to make this happen, we need to make sure that critical properties such safety and security are guaranteed. Moreover, it is not sufficient anymore to analyse and guarantee these properties independently in the development process, as it is case now, but we have to be able to address safety and security within a joint effort. Recent research has already pointed to their independencies and ways how they affect each other. In this report we provide insight into the state-of-the-art on safety and security approaches provided in the literature. We overview the most common approaches and methods used to provide reasoning about these properties, as well as we check latest updates in standards related to these properties.

  • 5.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lundqvist, Kristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Data Security and Privacy in Cyber-Physical Systems for Healthcare2017In: Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications / [ed] Houbing Song D, Glenn A. Fink PhD, and Sabina Jeschke Dr. rer. nat., Wiley-IEEE Press , 2017, p. 305-320Chapter in book (Other academic)
  • 6.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lisova, Elena
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ashjaei, Seyed Mohammad Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ashgar, Syed Usman
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    On incorporating security parameters in service level agreements2019In: CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science, SciTePress , 2019, p. 48-57Conference paper (Refereed)
    Abstract [en]

    With development of cloud computing new ways for easy, on-demand, Internet-based access to computing resources have emerged. In such context a Service Level Agreement (SLA) enables contractual agreements between service providers and users. Given an SLA, service users are able to establish trust in that the service outcome corresponds to what they have demanded during the service negotiation process. However, an SLA provides a limited support outside of basic Quality of Service (QoS) parameters, especially when it comes to security. We find security as an important factor to be included in adjusting an SLA according to user defined objectives. Incorporating it in an SLA is challenging due to difficulty to provide complete and quantifiable metrics, thus we propose to focus on a systematic way of addressing security using the security process. In this paper we investigate ways in which security might be incorporated already in the service negotiation process and captured in an SLA. We propose a corresponding process to develop and maintain an SLA that considers both design-, and run-time. To demonstrate the approach we built upon the existing SLAC language and extend its syntax to support security. An example of a service being provided with security guarantees illustrates the concept.

  • 7.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Lisova, Elena
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ashjaei, Seyed Mohammad Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ashgar, Syed Usman
    Mälardalen University.
    On Incorporating Security Parameters in Service Level Agreements2019In: CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science2019, 2019, p. 48-57Conference paper (Refereed)
    Abstract [en]

    With development of cloud computing new ways for easy, on-demand, Internet-based access to computing resources have emerged. In such context a Service Level Agreement (SLA) enables contractual agreements between service providers and users. Given an SLA, service users are able to establish trust in that the service outcome corresponds to what they have demanded during the service negotiation process. However, an SLA provides a limited support outside of basic Quality of Service (QoS) parameters, especially when it comes to security. We find security as an important factor to be included in adjusting an SLA according to user defined objectives. Incorporating it in an SLA is challenging due to difficulty to provide complete and quantifiable metrics, thus we propose to focus on a systematic way of addressing security using the security process. In this paper we investigate ways in which security might be incorporated already in the service negotiation process and captured in an SLA. We propose a corresponding process to develop and maintain an SLA that considers both design-, and run-time. To demonstrate the approach we built upon the existing SLAC language and extend its syntax to support security. An example of a service being provided with security guarantees illustrates the concept.

  • 8.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Papadopoulos, Alessandro
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sirjani, Marjan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards a Framework for Safe and Secure Adaptive Collaborative Systems2019In: The 9th IEEE International Workshop on Industrial Experience in Embedded Systems Design IEESD 2019, 2019Conference paper (Refereed)
  • 9.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Analyzing Resource-Usage Impact on Component-Based Systems Performance and Reliability2008In: 2008 International Conference on Computational Intelligence for Modelling Control & Automation, Los Alamitos, CA: IEEE Computer Society , 2008, p. 302-308Conference paper (Refereed)
    Abstract [en]

    An early prediction of resource utilization and its impacton system performance and reliability can reduce theoverall system cost, by allowing early correction of detectedproblems, or changes in development plans with minimizedoverhead. Nowadays, researchers are using both academicand commercial models to predict such attributes, by measuringthem at earliest stages of system development. Inthis paper, we give a short overview of existing predictionmodels for performance and reliability, targeting popularcomponent-based frameworks. Next, we describe our ownapproach for tackling such predictions, through an illustrationon a small example that deals with estimations of energyconsumption.

  • 10.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering.
    Algorithmic Computation of Strongest Postconditions of Services as Priced Timed Automata2012Report (Other academic)
    Abstract [en]

    Service-Oriented Systems (SOS) have gained importance in different application domains thanks to their ability to enable reusable functionality provided via well-defined interfaces, and the increased opportunities to compose existing units, called services, into various configurations. Developing applications in such a setup, by reusing existing services, brings some concerns regarding the assurance of the expected Quality-of-Service (QoS), and correctness of the employed services. In this paper, we provide a formal mechanism of computing service guarantees, automatically. We assume service models annotated with pre- and postconditions, their semantics given as Priced Timed Automata (PTA), and the forward analysis method for checking the service correctness w.r.t. given requirements. Under these assumptions, we show how to compute the strongest postcondition of the corresponding automata algorithmically, with respect to the specified precondition. The approach is illustrated on a small example of a service modeled as Priced Timed Automaton (PTAn).

  • 11.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    An Analyzable Model of Automated Service Negotiation2013In: Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013, 2013, p. 125-136Conference paper (Refereed)
    Abstract [en]

    Negotiation is a key aspect of Service-Oriented Systems, which is rarely supported by formal models and tools for analysis. Often, service negotiation proceeds with timing, cost and resource constraints, under which the users and providers exchange information on their respective goals, until reaching a consensus. Consequently, a mathematically driven technique to analyze various ways to achieve such goals is beneficial. In this paper, we propose an analyzable negotiation model between service clients and providers, in our recently introduced language REMES and its corresponding textual service composition language HDCL. The model can be viewed as a negotiation interface for different negotiation strategies and protocols, which iterates until an agreement is reached. We show how to analyze the negotiation model against timing, cost and utility constraints, by transforming it into the Timed Automata formal framework. We illustrate our approach through an insurance scenario assuming a form of the Contract Net Protocol for web services.

  • 12.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering.
    Behavioral Modeling and Refinement of Services2009In: Prodceedings of 21st Nordic Workshop on Programming Theory, NWPT '09, 2009Conference paper (Refereed)
  • 13.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering.
    Checking Correctness of Services Modeled as Priced Timed Automata2012In: Lecture Notes in Computer Science, vol. 7610, issue part 2, Springer, 2012, p. 308-322Chapter in book (Refereed)
    Abstract [en]

    Service-Oriented Systems (SOS) have gained importance in different application domains thanks to their ability to enable reusable functionality provided via well-defined interfaces, and the increased opportunities to compose existing units, called services, into various configurations. Developing applications in such a setup, by reusing existing services, brings some concerns regarding the assurance of the expected Quality-of-Service (QoS), and correctness of the employed services. In this paper, we describe a formal mechanism of computing service guarantees, automatically. We assume service models annotated with pre- and postconditions, with their semantics given as Priced Timed Automata (PTA), and the forward analysis method for checking the service correctness w.r.t. given requirements. Under these assumptions, we show how to compute the strongest postcondition of the corresponding automata algorithmically, with respect to the specified precondition. The approach is illustrated on a small example of a service modeled as Priced Timed Automaton (PTAn).

  • 14.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Distributed Energy Management Case Study: A Formal Approach to Analyzing Utility Functions2013Report (Other academic)
    Abstract [en]

    The service-oriented paradigm has been established to enable quicker development of new applications from already existing services. Service negotiation is a key technique to provide a way of deciding and choosing the most suitable service, out of possibly many services delivering similar functionality but having different response times, resource usages, prices, etc. In this paper, we present a formal approach to the clients-providers negotiation of distributed energy management. The models are described in our recently introduced REMES HDCL language, with timed automata semantics that allows us to apply UPPAAL-based tools for model-checking various scenarios of service negotiation. Our target is to compute ways of reaching the price- and reliability-optimal values of the utility function, at the end of the service negotiation.

  • 15.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering.
    Formal reasoning of resource-aware services2010Report (Other academic)
    Abstract [en]

    Service-oriented systems have recently emerged as context-independent component-based systems. Unlike components, services can be created, invoked, composed, and destroyed at run-time. Consequently, all services should have a way of advertising their capabilities to the entities that will use them, and service-oriented modeling should cater for various kinds of service composition. In this paper, we show how services can be formally described by the resource-aware timed behavioral language REMES, which we extend with service-specific information, such as type, capacity, time-to-serve, etc., as well as boolean constraints on inputs, and output guarantees. Assuming a Hoare-triple model of service correctness, we show how to check it by using the strongest postcondition semantics. To provide means for connecting REMES services, we propose a hierarchical language for service composition, which allows for verifying the latter’s correctness. The approach is applied on an abstracted version of an intelligent shuttle system, for which we also compute resource-efficient behaviors, and energy-time trade-offs, by model-checking the system’s underlying Priced Timed Automata semantic representation.

  • 16.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering.
    Pettersson, Paul
    Mälardalen University, School of Innovation, Design and Engineering.
    Modeling and Reasoning about Service Behaviors and their Compositions2010In: Lecture Notes in Computer Science, vol. 6416, Berlin: Springer , 2010, p. 82-96Chapter in book (Refereed)
    Abstract [en]

    Service-oriented systems have recently emerged as context-independent component-based systems. Unlike components, services can be created, invoked, composed, and destroyed at run-time. Consequently, all services need a way of advertising their capabilities to the entities that will use them, and serviceoriented modeling should cater for various kinds of service composition. In this paper, we show how services can be formally described by the resource-aware timed behavioral language REMES, which we extend with service-specific information, such as type, capacity, time-to-serve, etc., as well as boolean constraints on inputs, and output guarantees. Assuming a Hoare-triple model of service correctness, we show how to check it by using the strongest postcondition semantics. To provide means for connecting REMES services, we propose a hierarchical language for service composition, which allows for verifying the latter's correctness. The approach is applied on an abstracted version of an intelligent shuttle system.

  • 17.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Vahabi, Maryam
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Enabling Safe, Secure and Reliable Data Communication in IoT AAL Healthcare Applications2017In: Medicinteknikdagarna 2017 MTD 2017, 2017Conference paper (Refereed)
  • 18.
    Causevic, Aida
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Vulgarakis, Aneta
    Mälardalen University, School of Innovation, Design and Engineering.
    Towards a Unified Behavioral Model for Component-Based and Service-Oriented Systems2009In: Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International, 2009, p. 497-503Conference paper (Refereed)
    Abstract [en]

    There is no clear distinction between service-orientedsystems (SOS) and component-based systems (CBS). However,there are several characteristics that could let one considerSOS as a step further from CBS. In this paper, we discussthe general features of CBS and SOS, while accountingfor behavioral modeling in the language called REMES.First, we present REMES in the context of CBS modeling,and then we show how it can become suitable for SOS. Wealso discuss the relation between our model and the currentstate of the art.

  • 19.
    Enoiu, Eduard Paul
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Marinescu, Raluca
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Seceleanu, Cristina
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Design Tool for Service-oriented Systems2013In: Electronical Notes in Theoretical Computer Science, ISSN 1571-0661, E-ISSN 1571-0661, Vol. 295, p. 95-100Article in journal (Other academic)
    Abstract [en]

    In this paper we present a modeling and analysis tool for service-oriented systems. The tool enables graphical modeling of service-based systems, within the resource-aware timed behavioral language Remes, as well as a textual system description. We have developed a graphical environment where services can be composed as desired by the user, together with a textual service composition interface in which compositions can also be checked for correctness. We also provide automated traceability between the two design interfaces, which results in a tool that enhances the potential of system design by intuitive service manipulation. The paper presents the design principles, infrastructure, and the user interface of our tool.

  • 20.
    Fotouhi, Hossein
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Adnan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Vahabi, Maryam
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Interoperability in heterogeneous Low-Power Wireless Networks for Health Monitoring Systems2016In: 2016 IEEE International Conference on Communications Workshops, ICC 2016, 2016, p. 393-398Conference paper (Refereed)
    Abstract [en]

    Ensuring interoperability in the future Internet of Things applications can be a challenging task, especially in mission-critical applications such as Health Monitoring Systems. Existing low-power wireless network architectures are designed in isolated networks, and ensure a satisfying level of performance in homogeneous networks. However, with co-existence of different low-power networks, the interoperability related problems arise. To bridge this gap in this paper, we study various protocol stacks (i.e., Bluetooth, Bluetooth Low Energy, IEEE 802.15.4, ZigBee, 6LoWPAN and IEEE 802.15.6), and explain their specific features. Furthermore, we provide a generic protocol stack design that facilitates multiple radios with different protocol stacks, regardless of being IP-based or non-IP-based networks. We see this approach as a possibility to enhance network performance in terms of reliability, timeliness, and security, while providing higher levels of scalability and connectivity.

  • 21.
    Leander, Björn
    et al.
    aMälardalen University, ABB Industrial Automation, Process Control Platform, Västerås, Sweden.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Applicability of the IEC 62443 standard in Industry 4.0 / IIoT2019In: ACM International Conference Proceeding Series, Association for Computing Machinery , 2019Conference paper (Refereed)
    Abstract [en]

    Today’s industrial automation systems are undergoing a digital transformation that implies a shift towards the Internet of Things (IoT), leading to the Industrial Internet of Things (IIoT) paradigm. Existing Industrial Automated Control Systems (IACS), enriched with a potentially large number of IoT devices are expected to make systems more efficient, flexible, provide intelligence, and ultimately enable autonomous control. In general, the majority of such systems come with high level of criticality that calls for well-established methods and approaches when achieving cybersecurity, preferably prescribed by a standard. IEC 62443 is an industrial standard that provides procedures to manage risks related to cybersecurity threats in IACS. Given the new IIoT paradigm, it is likely that existing standards are not sufficiently aligned with the challenges related to developing and maintaining cybersecurity in such systems. In this paper we review the applicability of the IEC 62443 standard in IIoT contexts and discuss potential challenges the process owners might encounter. Our analysis underlines that some areas within the standard could prove difficult to reach compliance with. In particular, handling of cross zone communication and software updates require additional guidance. 

  • 22.
    Lisova, Elena
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards security case run-time adaptation by system decomposition into services2018In: Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 4102-4108Conference paper (Refereed)
    Abstract [en]

    For interconnected and complex systems, security is paramount for establishing trust in their correctness and design adequacy. Thus, security needs to be assured and a corresponding security assurance case needs to be presented to system stakeholders, security assessors, as well as to system users. However, security is dynamic by its nature and to maintain its acceptable security level, frequent updates might be required. Traditionally, a security assurance case is built from scratch whenever a change occurs, however given the cost of resources needed for such a task, a more effective and less time consuming way of handling updates is needed. Hence, the challenge of security case run-time adaptation is considered in this work. We survey the state of the art in security assurance and security case development to refine the challenge and identify system decomposition as one the enablers for security case run-time adaptation. We propose to apply system decomposition in terms of services and use service choreographies to facilitate security case run-time adaptation. The proposed approach is illustrated on an E-gas example.

  • 23.
    Lisova, Elena
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hänninen, Kaj
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Thane, Henrik
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hansson, Hans
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Systematic Way to Incorporate Security in Safety Analysis2018In: Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg, Luxemburg, 2018, p. 166-171Conference paper (Refereed)
    Abstract [en]

    Today's systems are being built to connect to public or semi-public networks, are able to communicate with other systems, e.g., in the context of Internet-of-Things (IoT), involve multiple stakeholders, have dynamic system reconfigurations, and operate in increasingly unpredictable environments. In such complex systems, assuring safety and security in a continuous and joint effort is a major challenge, not the least due to the increasing number of attack surfaces arising from the increased connectivity. In this paper we present an approach that aims to bridge the gap between safety and security engineering. The potential of the approach is illustrated on the example of E-gas system, discussing the cases when unintentional faults as well as malicious attacks are taken into consideration when assuring safety of the described system. 

  • 24.
    Lisova, Elena
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Clock Synchronization Considerations in Security Informed Safety Assurance of Autonomous Systems of Systems2017In: IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, p. 8385-8390Conference paper (Refereed)
  • 25.
    Lisova, Elena
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    El Hachem, Jamal
    Universite Pau & Pays Adour, LIUPPA, Pau, France.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Investigating Attack Propagation in a SoS via a Service Decomposition2019In: IEEE SERVICES Workshop on Cyber Security and Resilience in the Internet of Things CSR 2019, 2019Conference paper (Refereed)
    Abstract [en]

    A term systems of systems (SoS) refers to a setup in which a number of independent systems collaborate to create a value that each of them is unable to achieve independently. Complexity of a SoS structure is higher compared to its constitute systems that brings challenges in analyzing its critical properties such as security. An SoS can be seen as a set of connected systems or services that needs to be adequately protected. Communication between such systems or services can be considered as a service itself, and it is the paramount for establishment of a SoS as it enables connections, dependencies, and a cooperation. Given that reliable and predictable communication contributes directly to a correct functioning of an SoS, communication as a service is one of the main assets to consider. Protecting it from malicious adversaries should be one of the highest priorities within SoS design and operation. This study aims to investigate the attack propagation problem in terms of service-guarantees through the decomposition into sub-services enriched with preconditions and postconditions at the service levels. Such analysis is required as a prerequisite for an efficient SoS risk assessment at the design stage of the SoS development life cycle to protect it from possibly high impact attacks capable of affecting safety of systems and humans using the system.

  • 26.
    Lisova, Elena
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sljivo, Irfan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Safety and Security Co-Analyses: A Systematic Literature ReviewIn: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234Article in journal (Refereed)
    Abstract [en]

    Latest technological trends lead toward systems connected to public networks even in critical domains. Bringing together safety and security work is becoming imperative, as a connected safety-critical system is not safe if it is not secure. The main objective of this study is to investigate the current status of safety and security co-analysis in system engineering by conducting a systematic literature review. The steps of the review are the following: the research questions identification; agreement upon a search string; applying the search string to chosen databases; a selection criterion formulation for the relevant publications filtering; selected papers categorization and analysis. We focused on the early system development stages and identified 33 relevant publications categorized as follows: combined safety and security approaches that consider the mutual influence of safety and security; safety-informed security approaches that consider influence of safety on security; and security-informed safety approaches that consider influence of security on safety. The results showed that a number of identified approaches are driven by needs in fast developing application areas, e.g., automotive, while works focusing on combined analysis are mostly application area independent. Overall, the study shows that safety and security co-analysis is still a developing domain.

  • 27.
    Moradi, Fereidoun
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sedaghatbaf, Ali
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Abbaspour Asadollah, Sara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sirjani, Marjan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    On-Off Attack on a Blockchain-based IoT System2019In: First Workshop on Secure and Trustable Wirelessly Connected Industrial IoT ETFA - WS01, 2019Conference paper (Refereed)
    Abstract [en]

    There is a growing interest in using the Blockchain for resolving IoT security and trustworthiness issues existing in today’s complex systems. Blockchain concerns trust in peer to peer networks by providing a distributed tamper-resistant ledger. However, the combination of these two emerging technologies might create new problems and vulnerabilities that attackers might abuse.

    In this paper, we aim to investigate the trust mechanism of Lightweight Scalable BlockChain (LSB), that is a Blockchain specifically designed for Internet of Things networks, to show that a malicious participant in a Blockchain architecture have possibility to pursue an On-Off attack and downgrade the integrity of the distributed ledger. We choose a remote software update process as an instance to represent this violation. Finally, using the actor-based language Rebeca, we provide a model of a system under attack and verify the described attack scenario.

    Index Terms—Blockchain, Distributed Trust, On-Off Attack, IoT, Security.

  • 28.
    Surkovic, Amer
    et al.
    Mälardalen University.
    Hanic, Dzana
    Mälardalen University.
    Lisova, Elena
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Wenslandt, David
    Knightec AB, Sweden.
    Falk, Carl
    Knightec AB, Sweden.
    Towards Attack Models in Autonomous Systems of Systems2018In: 2018 13th System of Systems Engineering Conference, SoSE 2018, 2018, p. 583-585, article id 8428701Conference paper (Refereed)
  • 29.
    Vulgarakis, Aneta
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering.
    Applying REMES Behavioral Modeling to PLC Systems2009In: Mechatronic Systems, ISSN 1986-5147, Vol. 1, no 1, p. 40-49Article in journal (Refereed)
  • 30.
    Vulgarakis, Aneta
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Causevic, Aida
    Mälardalen University, School of Innovation, Design and Engineering.
    Applying REMES behavioral modeling to PLC systems2009In: 2009 XXII INTERNATIONAL SYMPOSIUM ON INFORMATION, COMMUNICATION AND AUTOMATION TECHNOLOGIES, IEEE , 2009, p. 98-105Conference paper (Refereed)
    Abstract [en]

    Abstract—Programmable logic controllers (PLCs), as aspecialized type of embedded systems, have been introduced toincrease system flexibility and reliability, but at the same time togive faster response time and lower cost of implementation. Inthe beginning, their use brought a revolutionary change, but withthe constant growth of system complexity, it became harder toguarantee both functional and extra functional properties, asearly as possible in the development process. In this paper, weshow how formal methods can be applied to describe PLC-basedsystems and illustrate it on an example of a car wash system.First, we show how the existing behavioral modeling languageREMES (REsource Model for Embedded Systems) can beextended to model the behavior of such systems. Second, we showhow REMES can be translated into networks of timed automataand priced timed automata in order to support safety andresource-wise reasoning about PLC systems. The formalverification of PLC systems is carried out in the UPPAAL andUPPAAL CORA tools.

  • 31.
    Čaušević, Aida
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Formal Approaches for Behavioral Modeling and Analysis of Design-time Services and Service Negotiations2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    During the past decade service-orientation has become a popular design paradigm, offering an approach in which services are the functional building blocks. Services are self-contained units of composition, built to be invoked, composed, and destroyed on (user) demand. Service-oriented systems (SOS) are a collection of services that are developed based on several design principles such as: (i) loose coupling between services (e.g., inter-service communication can involve either simple data passing or two or more connected services coordinating some activity) that allows services to be independent, yet highly interoperable when required; (ii) service abstraction, which emphasizes the need to hide as many implementation details as possible, yet still exposing functional and extra-functional capabilities that can be offered to service users; (iii) service reusability provided by the existing services in a rapid and flexible development process; (iv) service composability as one of the main assets of SOS that provide a design platform for services to be composed and decomposed, etc. One of the main concerns in such systems is ensuring service quality per se, but also guaranteeing the quality of newly composed services. To accomplish the above, we consider two system perspectives: the developer's and the user's view, respectively. In the former, one can be assumed to have access to the internal service representation: functionality, enabled actions, resource usage, and interactions with other services. In the second, one has information primarily on the service interface and exposed capabilities (attributes/features). Means of checking that services and service compositions meet the expected requirements, the so-called correctness issue, can enable optimization and possibility to guarantee a satisfactory level of a service composition quality. In order to accomplish exhaustive correctness checks of design-time SOS, we employ model-checking as the main formal verification technique, which eventually provides necessary information about quality-of-service (QoS), already at early stages of system development. ~As opposed to the traditional approach of software system construction, in SOS the same service may be offered at various prices, QoS, and other conditions, depending on the user needs. In such a setting, the interaction between involved parties requires the negotiation of what is possible at request time, aiming at meeting needs on demand. The service negotiation process often proceeds with timing, price, and resource constraints, under which users and providers exchange information on their respective goals, until reaching a consensus. Hence, a mathematically driven technique to analyze a priori various ways to achieve such goals is beneficial for understanding what and how can particular goals be achieved.

    This thesis presents the research that we have been carrying out over the past few years, which resulted in developing methods and tools for the specification, modeling, and formal analysis of services and service compositions in SOS. The contributions of the thesis consist of: (i)constructs for the formal description of services and service compositions using the resource-aware timed behavioral language called REMES; (ii) deductive and algorithmic approaches for checking correctness of services and service compositions;(iii) a model of service negotiation that includes different negotiation strategies, formally analyzed against timing and resource constraints; (iv) a tool-chain (REMES SOS IDE) that provides an editor and verification support (by integration with the UPPAAL model-checker) to REMES-based service-oriented designs;(v) a relevant case-study by which we exercise the applicability of our framework.The presented work has also been applied on other smaller examples presented in the published papers.

  • 32.
    Čaušević, Aida
    Mälardalen University, School of Innovation, Design and Engineering.
    Formal Approaches to Service-oriented Design: From Behavioral Modeling to Service Analysis2011Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Service-oriented systems (SOS) have recently emerged as context-independent component-based systems. In contrast to components, services can be created, invoked, composed and destroyed at run-time. Services are assumed to be platform independent and available for use within heterogeneous applications. One of the main assets in SOS is service composability. It allows the development of composite services with the main goal of reusable functionality provided by existing services in a low cost and rapid development process at run-time. However, in such distributed systems it becomes difficult to guarantee the quality of services (QoS), both in isolation, as well as of the newly created service compositions. Means of checking correctness of service composition can enable optimization w.r.t. the function and resource-usage of composed services, as well as provide a higher degree of QoS assurance of a service composition. To accomplish such goals, we employ model-checking technique for both single and composed services. The verification eventually provides necessaryinformation about QoS, already at early development stage.This thesis presents the research that we have been carrying out, on developing of methods and tools for specification, modeling, and formal analysis of services and service compositions in SOS. In this work, we first show how to formally check QoS in terms of performance and reliability for formallyspecified component-based systems (CBS). Next, we outline the commonalities and differences between SOS and CBS. Third, we develop constructs for the formal description of services using the resource-aware timed behavioral language called REMES, including development of language to support service compositions. At last, we show how to check service and service composition(functional, timing and resource-wise) correctness by employing the strongest post condition semantics. For less complex services and service compositions we choose to prove correctness using Hoare triples and the guarded command language. In case of complex services described as priced timed automata(PTA), we prove correctness via algorithmic computation of strongest post-condition of PTA.

1 - 32 of 32
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf