We introduce a method for the assessment of trust for n-open systems based on a measurement of fidelity and present a prototypical implementation of a complaint architecture. We construct a MAPE loop which monitors the compliance between corresponding figures of interest in cyber- and physical domains; derive measures of the system's trustworthiness; and use them to plan and execute actions aiming at guaranteeing system safety and resilience. We conclude with a view on our future work
Open computing environments are under a deluge of network attacks from complex threats. These threat...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
International audienceWe advance the ability to design reliable Cyber-Physical Systems of Systems (C...
AbstractWe introduce a method for the assessment of trust for n-open systems based on a measurement ...
Embedded systems such as Cyber-Physical Systems (CPS) are typically designed as a network of multipl...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...
International audienceWhen users need to perform a digital activity, they evaluate available systems...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
. Authentication in open networks usually requires participation of trusted entities. Many protocols...
Cyber-Physical Systems (CPS) are evolving to become smarter, more autonomous, connected and collabor...
Abstract. Trustworthiness of dynamical and distributed socio-technical systems is a key factor for t...
This paper presents a framework for trust evaluation through monitoring, in particular, to address t...
The analysis of existing software evaluation techniques reveals the need for evidence-based evaluati...
Abstract. The analysis of existing software evaluation techniques reveals the need for evidence-base...
Trustworthiness of dynamical and distributed socio-technical systems is a key factor for the success...
Open computing environments are under a deluge of network attacks from complex threats. These threat...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
International audienceWe advance the ability to design reliable Cyber-Physical Systems of Systems (C...
AbstractWe introduce a method for the assessment of trust for n-open systems based on a measurement ...
Embedded systems such as Cyber-Physical Systems (CPS) are typically designed as a network of multipl...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...
International audienceWhen users need to perform a digital activity, they evaluate available systems...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
. Authentication in open networks usually requires participation of trusted entities. Many protocols...
Cyber-Physical Systems (CPS) are evolving to become smarter, more autonomous, connected and collabor...
Abstract. Trustworthiness of dynamical and distributed socio-technical systems is a key factor for t...
This paper presents a framework for trust evaluation through monitoring, in particular, to address t...
The analysis of existing software evaluation techniques reveals the need for evidence-based evaluati...
Abstract. The analysis of existing software evaluation techniques reveals the need for evidence-base...
Trustworthiness of dynamical and distributed socio-technical systems is a key factor for the success...
Open computing environments are under a deluge of network attacks from complex threats. These threat...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
International audienceWe advance the ability to design reliable Cyber-Physical Systems of Systems (C...