From requirements to operation: Components for risk assessment in a pervasive system of systems
Authors: Ki-Aries, D., Dogan, H., Faily, S., Whittington, P., Williams, C.
Journal: Proceedings 2017 IEEE 25th International Requirements Engineering Conference Workshops Rew 2017
Publication Date: 29/09/2017
Pages: 83-89
DOI: 10.1109/REW.2017.36
Abstract:Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component systems, and their differing degrees of control and emergence. This paper presents three components for SoS risk assessment that integrate with existing risk assessment approaches: Human System Integration (HSI), Interoperability identification and analysis, and Emergent behaviour evaluation and control measures. We demonstrate the application of these components by assessing a pervasive SoS: a SmartPowerchair.
https://eprints.bournemouth.ac.uk/29480/
Source: Scopus
From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems
Authors: Ki-Aries, D., Dogan, H., Faily, S., Whittington, P., Williams, C.
Journal: 2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW)
Publication Date: 2017
Pages: 83-89
DOI: 10.1109/REW.2017.36
https://eprints.bournemouth.ac.uk/29480/
Source: Web of Science
From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems
Authors: Ki-Aries, D., Dogan, H., Faily, S., Whittington, P., Williams, C.
Conference: Fourth International Workshop on Evolving Security & Privacy Requirements Engineering
Dates: 04/09/2017
Publication Date: 04/09/2017
https://eprints.bournemouth.ac.uk/29480/
Source: Manual
From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems.
Authors: Ki-Aries, D., Dogan, H., Faily, S., Whittington, P., Williams, C.
Journal: RE Workshops
Publication Date: 2017
Pages: 83-89
Publisher: IEEE Computer Society
ISBN: 978-1-5386-3488-2
DOI: 10.1109/REW.2017.36
https://eprints.bournemouth.ac.uk/29480/
https://ieeexplore.ieee.org/xpl/conhome/8053951/proceeding
Source: DBLP