Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Systems Architecture

A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou Aug 2020

A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou

Masters Theses

Presently, cyber-physical systems are increasingly being integrated into societies, from the economic sector to the nuclear energy sector. Cyber-physical systems are systems that combine physical, digital, human, and other components, which operate through physical means and software. When system errors occur, the consequences of malfunction could negatively impact human life. Academic studies have relied on the MAPE-K feedback loop model to develop various system components to satisfy the self-adaptive features, such that violation of the safety requirements can be minimized. Assurance of system requirement satisfaction is argued through an industrial standard form, called an assurance case, which is usually applied …


Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh Jun 2012

Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh

Dissertations

Conventional real-time scheduling algorithms are in care of timing constraints; they don’t pay any attention to enhance or optimize the real-time packet’s security performance. In this work, we propose an adaptive security-aware scheduling with congestion control mechanism for packet switching networks using real-time agentbased systems. The proposed system combines the functionality of real-time scheduling with the security service enhancement, where the real-time scheduling unit uses the differentiated-earliest-deadline-first (Diff-EDF) scheduler, while the security service enhancement scheme adopts a congestion control mechanism based on a resource estimation methodology.

The security service enhancement unit was designed based on two models: singlelayer and weighted …