scispace - formally typeset
Search or ask a question
Author

Sorin M. Iacob

Bio: Sorin M. Iacob is an academic researcher from Thales (Netherlands). The author has contributed to research in topics: Dependability & Smart grid. The author has an hindex of 3, co-authored 5 publications receiving 21 citations.

Papers
More filters
Book ChapterDOI
01 Jan 2016
TL;DR: The essence of the concept emergence is aptly communicated by the following quote, attributed to Aristotle, who lived more than 2000 years ago: The Whole is Greater than the Sum of its Parts.
Abstract: The essence of the concept emergence is aptly communicated by the following quote, attributed to Aristotle, who lived more than 2000 years ago: The Whole is Greater than the Sum of its Parts.

22 citations

Patent
31 Dec 2013
TL;DR: In this paper, a method and system for controlling data distribution in a system (100) comprising a set of nodes (10) interconnected through a communication system and a shared data storage space (12), each node owning a part of the data maintained in the shared storage space.
Abstract: The invention provides a method and system for controlling data distribution in a system (100) comprising a set of nodes (10) interconnected through a communication system and a shared data storage space (12), each node owning a part of the data maintained in the shared data storage space. Each node comprises a node manager (110) for controlling access by producer and consumer nodes to the data owned by the node. A first group of nodes are associated with a first trusting level and a second group with a second trusting level. A common shared key is generated for all members of the first group, and a unique key derived from the shared key for each member of the second group. Access to the node data part is controlled based on the shared key for the first group and based on the unique derived key for the second group.

9 citations

Book ChapterDOI
01 Jan 2016
TL;DR: This chapter defines the overall tool-supported “AMADEOS architectural framework”, with its main building blocks and interfaces, and particularly focuses on Structure, Dependability, Security, Emergence, and Multi-criticality viewpoints of an SoS.
Abstract: This chapter defines the overall tool-supported “AMADEOS architectural framework”, with its main building blocks and interfaces. It particularly focuses on Structure, Dependability, Security, Emergence, and Multi-criticality viewpoints of an SoS.

4 citations

Book ChapterDOI
01 Jan 2016
TL;DR: This chapter starts by recalling the MAPE approach in Sect.
Abstract: SoS dynamicity refers to short-term changes in an SoS, which occur in response to changing environmental or operational parameters of the CSs. These changes may have different effects, such as SoS adaptation or the generation of emergent phenomena. This chapter starts by recalling the MAPE approach in Sect. 2 before to introduce existing monitoring approaches in Sect. 3. Finally, Sect. 4 overviews existing reconfiguration techniques for SoS dynamicity management, related to Analyzis, Planning and Execution phases and illustrates through an examples the possible implementations of dynamicity management with modelling and feedback control techniques.
Book ChapterDOI
01 Jan 2016
TL;DR: This chapter presents three case studies in the smart grid domain: Electrical Vehicle charging, Household Management, and an integrated case study that combines the first two together with ancillary services.
Abstract: In this chapter we present three case studies in the smart grid domain: Electrical Vehicle charging, Household Management, and an integrated case study that combines the first two together with ancillary services.

Cited by
More filters
01 Jan 2016
TL;DR: The emergence from chaos to order is universally compatible with any devices to read and will help you to enjoy a good book with a cup of coffee in the afternoon instead of coping with some malicious virus inside their laptop.
Abstract: Thank you very much for reading emergence from chaos to order. Maybe you have knowledge that, people have look numerous times for their chosen readings like this emergence from chaos to order, but end up in malicious downloads. Rather than enjoying a good book with a cup of coffee in the afternoon, instead they cope with some malicious virus inside their laptop. emergence from chaos to order is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection spans in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Merely said, the emergence from chaos to order is universally compatible with any devices to read.

254 citations

Patent
05 Oct 2018
TL;DR: The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against preestablished values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.
Abstract: The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users, and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against pre-established values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.

42 citations

Journal ArticleDOI
TL;DR: A threat analysis methodology and a supporting tool aimed at identifying (emerging) threats in evolving SoSs, reducing the cognitive load required to understand an SoS and the relations among CSs, and facilitating SoS risk management by proposing mitigation strategies for SoS administrators are presented.
Abstract: Cyber-physical Systems of Systems (SoSs) are large-scale systems made of independent and autonomous cyber-physical Constituent Systems (CSs) which may interoperate to achieve high-level goals also with the intervention of humans. Providing security in such SoSs means, among other features, forecasting and anticipating evolving SoS functionalities, ultimately identifying possible detrimental phenomena that may result from the interactions of CSs and humans. Such phenomena, usually called emergent phenomena, are often complex and difficult to capture: the first appearance of an emergent phenomenon in a cyber-physical SoS is often a surprise to the observers. Adequate support to understand emergent phenomena will assist in reducing both the likelihood of design or operational flaws, and the time needed to analyze the relations amongst the CSs, which always has a key economic significance. This article presents a threat analysis methodology and a supporting tool aimed at (i) identifying (emerging) threats in evolving SoSs, (ii) reducing the cognitive load required to understand an SoS and the relations among CSs, and (iii) facilitating SoS risk management by proposing mitigation strategies for SoS administrators. The proposed methodology, as well as the tool, is empirically validated on Smart Grid case studies by submitting questionnaires to a user base composed of 3 stakeholders and 18 BSc and MSc students.

14 citations

Proceedings ArticleDOI
05 Oct 2020
TL;DR: Although in most cases the software architecting process is governed by system-level requirements, the way requirements were specified by systems engineers, and the lack of domain-knowledge of software engineers, often lead to misinterpretations at software level.
Abstract: Background: The Systems Engineering and Software Engineering disciplines are highly intertwined in most modern Systems of Systems (SoS), and particularly so in industries such as defense, transportation, energy and health care. However, the combination of these disciplines during the architecting of SoS seems to be especially challenging; the literature suggests that major integration and operational issues are often linked to ambiguities and gaps between system-level and software-level architectures.Aims: The objective of this paper is to empirically investigate: 1) the state of practice on the interplay between these two disciplines in the architecting process of systems with SoS characteristics; 2) the problems perceived due to this interplay during said architecting process; and 3) the problems arising due to the particular characteristics of SoS systems.Method: We conducted a questionnaire-based online survey among practitioners from industries in the aforementioned domains, having a background on Systems Engineering, Software Engineering or both, and experience in the architecting of systems with SoS characteristics. The survey combined multiple-choice and open-ended questions, and the data collected from the 60 respondents were analyzed using quantitative and qualitative methods.Results: We found that although in most cases the software architecting process is governed by system-level requirements, the way requirements were specified by systems engineers, and the lack of domain-knowledge of software engineers, often lead to misinterpretations at software level. Furthermore, we found that unclear and/or incomplete specifications could be a common cause of technical debt in SoS projects, which is caused, in part, by insufficient interface definitions. It also appears that while the SoS concept has been adopted by some practitioners in the field, the same is not true about the existing and growing body of knowledge on the subject in Software Engineering resulting in recurring problems with system integration. Finally, while not directly related to the interplay of the two disciplines, the survey also indicates that low-level hardware components, despite being identified as the root cause of undesired emergent behavior, are often not considered when modeling or simulating the system.Conclusions: The survey indicates the need for tighter collaboration between the two disciplines, structured around concrete guidelines and practices for reconciling their differences. A number of open issues identified by this study require further investigation.

8 citations

Journal ArticleDOI
TL;DR: This work has developed a GRL-compliant extension to the popular iStar goal modeling language that takes the particularities of collaborative cyber-physical systems and their developers’ needs into account, and provides support for explicitly distinguishing between the goals of the individual collaborative cyber, physical systems and the network.
Abstract: Collaborative cyber-physical systems are capable of forming networks at runtime to achieve goals that are unachievable for individual systems. They do so by connecting to each other and exchanging information that helps them coordinate their behaviors to achieve shared goals. Their highly complex dependencies, however, are difficult to document using traditional goal modeling approaches. To help developers of collaborative cyber-physical systems leverage the advantages of goal modeling approaches, we developed a GRL-compliant extension to the popular iStar goal modeling language that takes the particularities of collaborative cyber-physical systems and their developers’ needs into account. In particular, our extension provides support for explicitly distinguishing between the goals of the individual collaborative cyber-physical systems and the network and for documenting various dependencies not only among the individual collaborative cyber-physical systems but also between the individual systems and the network. We provide abstract syntax, concrete syntax, and well-formedness rules for the extension. To illustrate the benefits of our extension for goal modeling of collaborative cyber-physical systems, we report on two case studies conducted in different industry domains.

6 citations