The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security attacks on medical devices have been shown to have potential safety concerns. Because of this, stakeholders (device makers, regulators, users, etc.) have increasing interest in enhancing security in medical devices. An effective means to approach this objective is to integrate systematic security requirements elicitation and analysis into the design and evaluation of medical device software...
There is very little research on how industry is dealing with the risk of legal liability when constructing safety-critical mechatronic systems that are also software intensive. In this paper we propose a case study approach with the goal to understand how liability concerns in this setting impact software development in industry. The approach takes into account that software development is embedded...
With the prevalent trend of computer and network in our country, the problem of security about internet information is becoming more and more outstanding. This article analyses the factors about the hidden security troubles of internet information that our country faced with at present, and put out some protecting measures from some aspects, such as technology, management and policy.
Although the need for humans and robots to work together in close proximity is increasing, this is currently not allowed with conventional industrial robots for reasons of safety. Next generation robots that can work safely in close proximity with humans must not only be highly functional, but must also be highly reliable with built in safety features. With this aim in mind, we have developed a safety...
This paper give the applications of safety audit and monitor technology in power management system. This paper first introduce the audit technology and its working environment and then introduce the elopements of the system which including the design of monitoring module in Proxy and network capability, etc. And it also proposes the implement flow of these function models including the implement flow...
High voltage technology, such as hybrid and electric drives, affects a number of international regulatory frameworks. A comprehensive approach to functional, electrical and chemical safety together with expert know-how on high voltage vehicles, systems, components and energy storage devices is necessary when deciding to export to overseas markets.
The automotive industry is concerned with developing large and complex embedded systems. The original equipment manufacturers (OEMs) are responsible for the safety of their systems, enforced by law in terms of liability. At the same time, there is a number of laws, for example the Automobile Safety Act, that has to be obeyed by the specification. We give insights into the current state of practice...
The problem of detection of control flow errors in software has been studied extensively in literature and many detection techniques have been proposed. These techniques typically have high memory and performance overheads and hence are unusable for real-time embedded systems which have tight memory and performance budgets. This paper presents two algorithms by which the overheads associated with...
One of the threats to watermarking security is unauthorized removal. In this paper, a framework based on extended Trusted Computer Platform to solve this problem was presented. Using Trusted Computing Platform could enhance the security of watermarking detection. The TPM as a supervisor that control the watermark detection program and only the legal one can use the secret knowledge, that is, this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.