04.12.2012 Views

Towards a Platform for Widespread Embedded Intelligence - ERCIM

Towards a Platform for Widespread Embedded Intelligence - ERCIM

Towards a Platform for Widespread Embedded Intelligence - ERCIM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.Europe-specific security and dependability:<br />

Europe has a very specific heterogeneous<br />

culture and history and set<br />

of attitudes to trust and society that<br />

requires specific research profiling.<br />

3.Infrastructure robustness and availability:<br />

Further research ef<strong>for</strong>ts are<br />

needed <strong>for</strong> the assurance of ICT network<br />

and service infrastructures, as<br />

well as the robustness and availability<br />

of critical infrastructure, such as<br />

health, energy, transport or finance.<br />

4.Interoperability: Research on the<br />

interoperability between security and<br />

dependability technologies and standards.<br />

5.Processes <strong>for</strong> developing secure and<br />

dependable systems: Research on the<br />

systematic improvement of secure and<br />

dependable system development<br />

(including hardware and software)<br />

from their design phase.<br />

6.Security and dependability preservation:<br />

In an increasingly complex world<br />

of evolving requirements, technologies<br />

and systems, maintenance of<br />

effective system security and dependability<br />

is critical and is essential <strong>for</strong><br />

preserving user confidence.<br />

7.User-centric security and dependability<br />

standardisation: Strengthen the<br />

structured involvement of end users<br />

and their respective representatives<br />

into relevant standardization activities<br />

involving security and dependability<br />

technologies.<br />

8.Security and dependability of service<br />

oriented architectures (SOA): The<br />

need to establish and maintain trust<br />

and manage policy regulations and<br />

service level agreements in an SOA<br />

context, together with commensurate<br />

advances in software engineering to<br />

deliver service expectations.<br />

9.Technologies <strong>for</strong> security: Research is<br />

needed to provide a higher assurance<br />

of trusted communication and handling<br />

of digital in<strong>for</strong>mation.<br />

Cryptology and trusted functionality<br />

and computing need to be considered.<br />

In addition to these nine key research<br />

areas, four future grand challenges covering<br />

a 10-20 year vision are presented<br />

by the Advisory Board. They illustrate<br />

possible longer-term possibilities and<br />

implications:<br />

1.Countering vulnerabilities and threats<br />

within digital urbanization: This challenge<br />

addresses open problems that we<br />

will face in security and dependability<br />

from the expansion and globalization<br />

of digital convergence by 2010-2015.<br />

2.Duality between digital privacy and<br />

collective security: digital dignity and<br />

sovereignty: This challenge deals with<br />

future privacy issues of all the stakeholders,<br />

whether citizens, groups,<br />

enterprises or states. It addresses the<br />

problem of how to override the 'Big<br />

Brother' syndrome and 'dark security',<br />

ie, the future assurance of digital<br />

sovereignty and dignity <strong>for</strong> the various<br />

stakeholders.<br />

3.Objective and automated processes:<br />

This challenge addresses the problem<br />

of how to attain a controllable and<br />

manageable world of complex digital<br />

artefacts by 2015 and how to inject<br />

regular, quantitative techniques and<br />

engineering to make the field truly scientific.<br />

4.Beyond the horizon: a new convergence:<br />

This last challenge deals with<br />

the preparation of a new convergence<br />

at a horizon of 2020 and beyond,<br />

which is the bio-nano-info-quantum<br />

'galaxy' and the new security and<br />

dependability challenges that will<br />

emerge.<br />

Links:<br />

The full report of the SecurIST Advisory<br />

Board recommendations:<br />

http://www.securitytask<strong>for</strong>ce.eu/<br />

Please contact:<br />

Jim Clarke, Water<strong>for</strong>d Institute of<br />

Technology, Telecommunications Software<br />

and Systems Group, SecurISTCoordinator<br />

E-mail: jclarke@tssg.org<br />

European Research Advances in <strong>Embedded</strong> <strong>Intelligence</strong><br />

The IST Results news service features numerous European<br />

research organisations and industrial partners whose work on<br />

embedded intelligence has been funding under the European<br />

Commission's In<strong>for</strong>mation Society Technologies (IST) R&D<br />

priority.<br />

These research projects focus on many different applications<br />

of embedded systems, <strong>for</strong> example:<br />

• the ASAP project team has produced an open source programming,<br />

analysis and optimisation toolkit <strong>for</strong> pervasive<br />

computing systems using Constraint Logic Programming<br />

(CLP) languages. It has been validated in a series of case<br />

studies and is expected to open the way to more effective<br />

and efficient embedded systems development in the future.<br />

• The <strong>Embedded</strong> WiseNts project has brought together<br />

twelve partners from the top research institutions in wireless<br />

communication, distributed computing and cooper-<br />

EUROPEAN SCENE<br />

ating objects in ten different European countries to focus on<br />

the development of Wireless Sensor Networks (WSN) and<br />

their applications, especially in the <strong>for</strong>m of Cooperating<br />

Objects (CO), to help develop a roadmap <strong>for</strong> innovative<br />

future applications.<br />

• A new technology, dubbed <strong>Embedded</strong> and Communicating<br />

Agents, has allowed researchers at Sony's Computer<br />

Science Laboratory in France to add a new level of intelligence<br />

to a robotic dog. Instead of teaching the dog new<br />

tricks, the algorithms, design principles and mechanisms<br />

developed by the ECAgents project allow the robotic pet to<br />

learn new tricks itself and share its knowledge with others.<br />

For more examples of recent research results related to<br />

embedded intelligence and other current ICT themes, visit<br />

IST Results at http://istresults.cordis.europa.eu<br />

<strong>ERCIM</strong> News No. 67, October 2006<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!