Trusted computing Engineering for Resource constrained Embedded Systems Applicat...
Trusted computing Engineering for Resource constrained Embedded Systems Application
The objective of TERESA is to define, demonstrate and validate an engineering discipline for trust that is adapted to resource constrained embedded systems. We define trust as the degree with which security and dependability requi...
ver más
31/01/2013
TRIALOG
4M€
Presupuesto del proyecto: 4M€
Líder del proyecto
TRIALOG
No se ha especificado una descripción o un objeto social para esta compañía.
TRL
4-5
Fecha límite participación
Sin fecha límite de participación.
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Información proyecto TERESA
Líder del proyecto
TRIALOG
No se ha especificado una descripción o un objeto social para esta compañía.
TRL
4-5
Presupuesto del proyecto
4M€
Fecha límite de participación
Sin fecha límite de participación.
Descripción del proyecto
The objective of TERESA is to define, demonstrate and validate an engineering discipline for trust that is adapted to resource constrained embedded systems. We define trust as the degree with which security and dependability requirements are met.Resource constrained embedded systems are characterized as follows:\tThey belong to different application sectors\tComputing resource are mostly statically determined and allocated through a process consisting of a configuration phase and a build phase\tThey are generally high integrity systems with strong assurance requirements. They therefore use advanced engineering disciplines.The proposed approach is to use a model-based repository of security and dependability patterns:\tApplication sector trust models are defined as profiles (e.g. UML, SysML profiles), based on a common trust meta-model\tSecurity and dependability patterns, platform independent are identified and defined for each application sectors (some patterns could be used by several application sectors)\tFormal properties on security and dependability are defined and validated for patterns used in application sectors requiring this level of assurance\tPlatform dependent implementation of the patterns are of the patterns are guided with very precise requirementsThe engineering process for resource constrained embedded systems will be validated in four application sectors: automotive systems, home control systems, industry control, and metering.