منابع مشابه
Who Watches the Watchers
The rise in the use of electronic health records (EHRs) and associated resources over the last decade is leading to the end of the paper medical record and all the risks associated with the use of a paper chart. However, there has not been a concomitant creation of a systematic oversight body that is specifically charged with ensuring the public’s safety through the use of EHR knowledge resourc...
متن کاملOn the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?
The increased level of connectivity makes security an essential aspect to ensure that safety-critical embedded systems deliver the level of safety for which they were designed. However, embedded systems designers face unique technological and economics challenges when incorporating security into their products. In this paper, we focus on two of these challenges unique to embedded systems, and p...
متن کاملWho watches the watchers: Validating the ProB Validation Tool
Over the years, PROB has moved from a tool that complemented proving, to a development environment that is now sometimes used instead of proving for applications, such as exhaustive model checking or data validation. This has led to much more stringent requirements on the integrity of PROB. In this paper we present a summary of our validation efforts for PROB, in particular within the context o...
متن کاملWho watches the watchers : Validating the ProB Validation Tool ∗ Jens Bendisposto Sebastian Krings
Over the years, PROB has moved from a tool that complemented proving, to a development environment that is now sometimes used instead of proving for applications, such as exhaustive model checking or data validation. This has led to much more stringent requirements on the integrity of PROB. In this paper we present a summary of our validation efforts for PROB, in particular within the context o...
متن کاملWho Watches the Watchmen? Protecting Operating System Reliability Mechanisms
We present the design and initial evaluation of a resilient operating system architecture that leverages HW architectures combining few resilient with many non-resilient CPU cores. To this end, we build our system around a Reliable Computing Base (RCB) consisting of those software components that must work for reliable operation, and run the RCB on the resilient cores. The remainder of the syst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Organisationsberatung, Supervision, Coaching
سال: 2018
ISSN: 1618-808X,1862-2577
DOI: 10.1007/s11613-018-0569-x