Verifying Interoperability Requirements in Pervasive Systems
验证普及系统中的互操作性要求
基本信息
- 批准号:EP/F033540/1
- 负责人:
- 金额:$ 53.3万
- 依托单位:
- 依托单位国家:英国
- 项目类别:Research Grant
- 财政年份:2008
- 资助国家:英国
- 起止时间:2008 至 无数据
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
The success of pervasive computing depends crucially on the ability to build, maintain and augment interoperable systems: components from different manufacturers built at different times are required to interact to achieve the user's overall goals.Pervasive systems often contain devices which must operate in very different environments and connect together in different ways, e.g., over ad-hoc wireless connections to a variety of systems, and still satisfy all the desired security and performance properties. Our approach to verifying these properties is to identify interoperability requirements for the interaction between the devices and their environment. These requirements introduce also an important layer of abstraction because they allow modularity in the verification process: it suffices to show that each mobile device or fixed component meets the interoperability requirements, and that the interoperability requirements entail the desired high-level properties.We argue that this verification framework makes it possible to adapt and extend techniques (such as model checking and process algebras) which have traditionally been used for verifying properties of small homogeneous systems, to large heterogenous systems. To support this thesis, we will develop techniques to verify properties concerning important aspects of heterogenous systems' security, individual and collective behaviour, performance and privacy. We will use the formal techniques to verify the consequent interoperability requirements, and evaluate their effectiveness through case studies.Note that our focus is on the verification of designs; in particular we focus on the design of basic component behaviours and the protocols which dictate access to them and interaction between them. It is important to note our intention is not to develop pervasive computing systems as such, but rather to draw motivation from, and test our ideas in, a number of planned and existing systems.Three case studies are planned; two are with industrial collaborators. The case studies will be drawn from three layers typical within pervasive systems: application, infrastructure and network. One industrial case study will be a healthcare application. One of its crucial features is the need for the monitoring device to operate in different environments. Hence a careful analysis of the necessary interoperability requirements is mandatory for this application. We will develop and apply our techniques as the system is designed, thus influencing directly the design of the application, motivating our techniques as we develop them, and gaining real life experience of applying our techniques in the field. In addition, our past experience indicates that we will also bring in further case studies, as the project develops. Drawing on the variety of expertise of the members of the consortium, we hope to make a step change in verification technology by developing novel techniques and learning which techniques are most effective in different contexts. The outcomes will directly benefit system designers, and indirectly, end users. They will include techniques applicable to a wide range of application domains, and results and lessons learned from three specific applications including a healthcare data capture system and RFID system infrastructure.
普遍计算的成功取决于构建,维护和增强可互操作系统的能力:在不同时间构建的不同制造商的组件需要进行交互以实现用户的整体目标,通常包含在非常不同的环境中运行的设备,并且必须在不同的环境中运行,并以不同的方式连接到不同的无线连接,以达到无线连接,以使各种系统不满意和各种系统,并且各种各样的效率以及各种各样的各种效率和各种各样的各种效率和各种各样的各种各样的效率和各种各样的效率。我们验证这些属性的方法是确定设备与其环境之间相互作用的互操作性要求。这些要求还引入了重要的抽象层,因为它们允许在验证过程中模块化:足以表明每个移动设备或固定组件都满足互操作性的要求,并且互操作性要求需要所需的高级属性。我们认为,此验证框架可以适应和扩展验证技术(例如模型范围)的验证框架(诸如型号的验证)(诸如型号)的范围(诸如验证)的范围(诸如型号)。系统,大型异源系统。为了支持这一论点,我们将开发技术来验证有关异源系统安全,个人和集体行为,绩效和隐私的重要方面的属性。我们将使用正式技术来验证随之而来的互操作性要求,并通过案例研究评估其有效性。注意我们的重点是设计验证;特别是,我们专注于基本组件行为的设计以及决定访问它们的协议以及它们之间的相互作用。重要的是要注意,我们的意图是不开发普遍的计算系统,而是要从计划和现有的系统中汲取动力并测试我们的想法。计划进行三个案例研究;有两个与工业合作者在一起。案例研究将来自普遍系统中典型的三层:应用,基础架构和网络。一个工业案例研究将是医疗保健。它的关键特征之一是需要监视设备在不同的环境中操作。因此,对于此应用,必须仔细分析必要的互操作性要求。当系统的设计时,我们将开发和应用我们的技术,从而直接影响应用程序的设计,在开发它们时激发我们的技术,并获得现实生活中的经验,以将我们的技术应用于现场。此外,我们过去的经验表明,随着项目的发展,我们还将引入进一步的案例研究。利用财团成员的各种专业知识,我们希望通过开发新颖的技术和学习哪些技术在不同情况下最有效的技术来改变验证技术的步骤。结果将直接使系统设计师和最终用户间接受益。它们将包括适用于广泛应用领域的技术,以及从包括医疗保健数据捕获系统和RFID系统基础架构在内的三个特定应用程序中学到的结果和经验教训。
项目成果
期刊论文数量(10)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Verifying Privacy-Type Properties in a Modular Way
- DOI:10.1109/csf.2012.16
- 发表时间:2012-06
- 期刊:
- 影响因子:0
- 作者:Myrto Arapinis;Vincent Cheval;S. Delaune
- 通讯作者:Myrto Arapinis;Vincent Cheval;S. Delaune
Privacy through Pseudonymity in Mobile Telephony Systems
- DOI:10.14722/ndss.2014.23082
- 发表时间:2014-01-01
- 期刊:
- 影响因子:0
- 作者:Arapinis, Myrto;Mancini, Loretta Ilaria;Ryan, Mark
- 通讯作者:Ryan, Mark
Analysis of privacy in mobile telephony systems
移动电话系统中的隐私分析
- DOI:10.1007/s10207-016-0338-9
- 发表时间:2016
- 期刊:
- 影响因子:3.2
- 作者:Arapinis M
- 通讯作者:Arapinis M
StatVerif: Verification of Stateful Processes
StatVerif:状态进程的验证
- DOI:10.1109/csf.2011.10
- 发表时间:2011
- 期刊:
- 影响因子:0
- 作者:Arapinis M
- 通讯作者:Arapinis M
Stateful applied pi calculus: Observational equivalence and labelled bisimilarity
有状态应用 pi 演算:观察等价性和标记的双相似性
- DOI:10.1016/j.jlamp.2017.03.001
- 发表时间:2017
- 期刊:
- 影响因子:0.9
- 作者:Arapinis M
- 通讯作者:Arapinis M
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Mark Ryan其他文献
Privacy vs. Security
隐私与安全
- DOI:
10.1007/978-1-4471-6530-9 - 发表时间:
2014 - 期刊:
- 影响因子:3.9
- 作者:
Sophie Stalla;J. Phillips;Mark Ryan - 通讯作者:
Mark Ryan
University of Birmingham Smart-Guard
伯明翰大学智能卫士
- DOI:
- 发表时间:
- 期刊:
- 影响因子:0
- 作者:
Michael Denzel;Alessandro Bruni;Mark Ryan - 通讯作者:
Mark Ryan
The impact of splenic artery embolization on the management of splenic trauma: an 8-year review
- DOI:
10.1016/j.amjsurg.2008.11.017 - 发表时间:
2009-03-01 - 期刊:
- 影响因子:
- 作者:
Akpofure Peter Ekeh;Brent Izu;Mark Ryan;Mary C. McCarthy - 通讯作者:
Mary C. McCarthy
901-95 Stress-induced Subendocardial Underperfusion: A Potential Mechanism of Ischemia in Hypertrophic Cardiomyopathy (HCM)
- DOI:
10.1016/0735-1097(95)91572-f - 发表时间:
1995-02-01 - 期刊:
- 影响因子:
- 作者:
Lubna Choudhury;Roberto Gistri;Mark Ryan;Franco Cecchi;William J. McKenna;Paolo G. Camici - 通讯作者:
Paolo G. Camici
The Effect of Fat Level of the Diet on General Nutrition XI. The Protective Effect of Varying Levels of Ethyl Linoleate Against Multiple Sublethal Doses of X-Irradiation in the Rat
- DOI:
10.1093/jn/52.4.637 - 发表时间:
1954-04-01 - 期刊:
- 影响因子:
- 作者:
Amber L.S. Cheng;Mark Ryan;Roslyn Alfin-Slater;Harry J. Deuel - 通讯作者:
Harry J. Deuel
Mark Ryan的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Mark Ryan', 18)}}的其他基金
User-controlled hardware security anchors: evaluation and designs
用户控制的硬件安全锚:评估和设计
- 批准号:
EP/R012598/1 - 财政年份:2018
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
Academic Centre of Excellence in Cyber Security Research - University of Birmingham
网络安全研究卓越学术中心 - 伯明翰大学
- 批准号:
EP/R007128/1 - 财政年份:2017
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
Academic Centre of Excellence in Cyber Security Research - University of Birmingham
网络安全研究卓越学术中心 - 伯明翰大学
- 批准号:
EP/L001802/1 - 财政年份:2013
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
Trust Domains - A framework for modelling and designing e-service infrastructures for controlled sharing of information
信任域 - 用于建模和设计电子服务基础设施以实现受控信息共享的框架
- 批准号:
TS/I002529/1 - 财政年份:2011
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
Analysing Security and Privacy Properties
分析安全和隐私属性
- 批准号:
EP/H005501/1 - 财政年份:2010
- 资助金额:
$ 53.3万 - 项目类别:
Fellowship
10th International Conference on Information and Communications Security
第十届信息与通信安全国际会议
- 批准号:
EP/G005613/1 - 财政年份:2008
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
Verifying anonymity and privacy properties of security protocols
验证安全协议的匿名性和隐私属性
- 批准号:
EP/E040829/1 - 财政年份:2007
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
Verifying Properties in Electronic Voting Protocols
验证电子投票协议中的属性
- 批准号:
EP/E029833/1 - 财政年份:2006
- 资助金额:
$ 53.3万 - 项目类别:
Research Grant
相似国自然基金
电动汽车大功率无线充电磁耦合机构多参量协同优化设计及互操作性评价技术研究
- 批准号:52277006
- 批准年份:2022
- 资助金额:54.00 万元
- 项目类别:面上项目
电动汽车大功率无线充电磁耦合机构多参量协同优化设计及互操作性评价技术研究
- 批准号:
- 批准年份:2022
- 资助金额:54 万元
- 项目类别:面上项目
电动汽车无线充电系统互操作性及其优化控制关键问题研究
- 批准号:51807138
- 批准年份:2018
- 资助金额:28.0 万元
- 项目类别:青年科学基金项目
知识型服务的供给侧结构及供-需交互的软件机理
- 批准号:61672387
- 批准年份:2016
- 资助金额:62.0 万元
- 项目类别:面上项目
面向变型设计的知识表示与互操作性研究
- 批准号:61562016
- 批准年份:2015
- 资助金额:40.0 万元
- 项目类别:地区科学基金项目
相似海外基金
ALASKA IMMUNIZATION PROGRAM CAPACITY BLDG ASSISTANCE FOR INFRASTRUCTURE ENHANCEMENTS TO MEET INTEROPERABILITY REQUIREMENTS
阿拉斯加免疫计划能力大楼为增强基础设施提供援助,以满足互操作性要求
- 批准号:
8902654 - 财政年份:2015
- 资助金额:
$ 53.3万 - 项目类别:
Interoperability Requirements and Limitations on Intelligence and Electronic Warfare Platforms
情报和电子战平台的互操作性要求和限制
- 批准号:
488433-2015 - 财政年份:2015
- 资助金额:
$ 53.3万 - 项目类别:
Engage Grants Program
PPHF 2014: IMMUNIZATION CAPACITY BUILDING ASSISTANCE FOR INFRASTRUCTURE ENHANCEMENTS TO MEET INTEROPERABILITY REQUIREMENTS
PPHF 2014:免疫能力建设援助,以增强基础设施以满足互操作性要求
- 批准号:
8903442 - 财政年份:2015
- 资助金额:
$ 53.3万 - 项目类别:
MONTANA DPHHS IMMUNIZATION CAPACITY BUILDING ASSISTANCE FOR INFRASTRUCTURE ENHANCEMENTS TO MEET INTEROPERABILITY REQUIREMENTS
蒙大拿州 DPHHS 免疫能力建设援助,用于增强基础设施以满足互操作性要求
- 批准号:
8903789 - 财政年份:2015
- 资助金额:
$ 53.3万 - 项目类别:
GEORGIA IMMUNIZATION PROGRAM IMMUNIZATION INFRASTRUCTURE ENHANCEMENTS TO MEET INTEROPERABILITY REQUIREMENTS
佐治亚州免疫计划增强免疫基础设施以满足互操作性要求
- 批准号:
8903933 - 财政年份:2014
- 资助金额:
$ 53.3万 - 项目类别: