The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software
نویسندگان
چکیده
Over the past five years, there has been considerable growth and established value in the practice of modeling automotive software requirements. Much of this growth has been centered on requirements of software associated with the established functional areas of an automobile, such as those associated with powertrain, chassis, body, safety and infotainment. This paper makes a case for modeling four additional attributes that are increasingly important as vehicles become information conduits: security, privacy, usability, and reliability. These four attributes are important in creating specifications for embedded in-vehicle automotive software. This paper examines the automobile context of security, privacy, usability and reliability (SPUR). In an automobile safety is paramount, and while leisure may certainly be found in an automobile, compromising driver attention could mean loss of life or serious injury and loss of productivity. All this makes the automobile a very special case of information and physical mobility — as in the cases of cellular phone based mobility, and mass transportation (bus, train, ship, airplane) based mobility. Several real-world use-cases are reviewed to illustrate both the consumer and system needs associated with SPUR in the automobile and to highlight the associated functional and non-functional requirements. From these requirements the underlying architectural elements of automotive SPUR are also derived. Broadly speaking these elements span three software service domains: the off-board enterprise software domain, the nomadic (device or service) software domain and the embedded (in-vehicle) software domain all of which need to work in tandem for the creation and complete lifecycle management of automotive software.
منابع مشابه
IT Security in Automotive Software Development
In the last years, automotive systems evolved to be more and more software-intensive systems. As a result, considerable attention has been paid to establish an efficient software development process of such systems, where reliability is an important criterion. Hence, model-driven development (MDD), software engineering and requirements engineering (amongst others) found their way into the syste...
متن کاملThe effect of developing the dynamics of library software system on information security management (Case study: Libraries of Islamic Azad universities of the country)
Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملتأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراکگذاری اطلاعات در شبکههای اجتماعی موبایل: نقش تعدیلکننده متغیر جنسیت
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
متن کاملThe Web of System Performance: Extending the TAM Model
Information technology can substantially enhance a wide variety of work performances, but such gains are lost if people cannot use the applications. Hence the Technology Acceptance Model (TAM) model successfully made usability a key application quality requirement, alongside functionality. However the field of quality systems requirements includes factors distinct from usability. The Web of Sys...
متن کامل