-
European Network For Gender Balance in Informatics (EUGAIN): Activities and Results
Authors:
Letizia Jaccheri,
Barbora Buhnova,
Birgit Penzenstadler,
Karima Boudaoud,
Valentina Lenarduzzi
Abstract:
This chapter provides a summary of the activities and results of the European Network For Gender Balance in Informatics (EUGAIN, EU COST Action CA19122). The main aim and objective of the network is to improve gender balance in informatics at all levels, from undergraduate and graduate studies to participation and leadership both in academia and industry, through the creation of a European network…
▽ More
This chapter provides a summary of the activities and results of the European Network For Gender Balance in Informatics (EUGAIN, EU COST Action CA19122). The main aim and objective of the network is to improve gender balance in informatics at all levels, from undergraduate and graduate studies to participation and leadership both in academia and industry, through the creation of a European network of colleagues working at the forefront of the efforts for gender balance in informatics in their countries and research communities.
△ Less
Submitted 24 June, 2024;
originally announced July 2024.
-
Future Vision of Dynamic Certification Schemes for Autonomous Systems
Authors:
Dasa Kusnirakova,
Barbora Buhnova
Abstract:
As software becomes increasingly pervasive in critical domains like autonomous driving, new challenges arise, necessitating rethinking of system engineering approaches. The gradual takeover of all critical driving functions by autonomous driving adds to the complexity of certifying these systems. Namely, certification procedures do not fully keep pace with the dynamism and unpredictability of futu…
▽ More
As software becomes increasingly pervasive in critical domains like autonomous driving, new challenges arise, necessitating rethinking of system engineering approaches. The gradual takeover of all critical driving functions by autonomous driving adds to the complexity of certifying these systems. Namely, certification procedures do not fully keep pace with the dynamism and unpredictability of future autonomous systems, and they may not fully guarantee compliance with the requirements imposed on these systems.
In this paper, we have identified several issues with the current certification strategies that could pose serious safety risks. As an example, we highlight the inadequate reflection of software changes in constantly evolving systems and the lack of support for systems' cooperation necessary for managing coordinated movements. Other shortcomings include the narrow focus of awarded certification, neglecting aspects such as the ethical behavior of autonomous software systems. The contribution of this paper is threefold. First, we analyze the existing international standards used in certification processes in relation to the requirements derived from dynamic software ecosystems and autonomous systems themselves, and identify their shortcomings. Second, we outline six suggestions for rethinking certification to foster comprehensive solutions to the identified problems. Third, a conceptual Multi-Layer Trust Governance Framework is introduced to establish a robust governance structure for autonomous ecosystems and associated processes, including envisioned future certification schemes. The framework comprises three layers, which together support safe and ethical operation of autonomous systems.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Adopting the Actor Model for Antifragile Serverless Architectures
Authors:
Marcel Mraz,
Hind Bangui,
Bruno Rossi,
Barbora Buhnova
Abstract:
Antifragility is a novel concept focusing on letting software systems learn and improve over time based on sustained adverse events such as failures. The actor model has been proposed to deal with concurrent computation and has recently been adopted in several serverless platforms. In this paper, we propose a new idea for supporting the adoption of supervision strategies in serverless systems to i…
▽ More
Antifragility is a novel concept focusing on letting software systems learn and improve over time based on sustained adverse events such as failures. The actor model has been proposed to deal with concurrent computation and has recently been adopted in several serverless platforms. In this paper, we propose a new idea for supporting the adoption of supervision strategies in serverless systems to improve the antifragility properties of such systems. We define a predictive strategy based on the concept of stressors (e.g., injecting failures), in which actors or a hierarchy of actors can be impacted and analyzed for systems' improvement. The proposed solution can improve the system's resiliency in exchange for higher complexity but goes in the direction of building antifragile systems.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Digital Twins for Trust Building in Autonomous Drones through Dynamic Safety Evaluation
Authors:
Danish Iqbal,
Barbora Buhnova,
Emilia Cioroaica
Abstract:
The adoption process of innovative software-intensive technologies leverages complex trust concerns in different forms and shapes. Perceived safety plays a fundamental role in technology adoption, being especially crucial in the case of those innovative software-driven technologies characterized by a high degree of dynamism and unpredictability, like collaborating autonomous systems. These systems…
▽ More
The adoption process of innovative software-intensive technologies leverages complex trust concerns in different forms and shapes. Perceived safety plays a fundamental role in technology adoption, being especially crucial in the case of those innovative software-driven technologies characterized by a high degree of dynamism and unpredictability, like collaborating autonomous systems. These systems need to synchronize their maneuvers in order to collaboratively engage in reactions to unpredictable incoming hazardous situations. That is however only possible in the presence of mutual trust.
In this paper, we propose an approach for machine-to-machine dynamic trust assessment for collaborating autonomous systems that supports trust-building based on the concept of dynamic safety assurance within the collaborative process among the software-intensive autonomous systems. In our approach, we leverage the concept of digital twins which are abstract models fed with real-time data used in the run-time dynamic exchange of information. The information exchange is performed through the execution of specialized models that embed the necessary safety properties. More particularly, we examine the possible role of the Digital Twins in machine-to-machine trust building and present their design in supporting dynamic trust assessment of autonomous drones. Ultimately, we present a proof of concept of direct and indirect trust assessment by employing the Digital Twin in a use case involving two autonomous collaborating drones.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Rethinking Certification for Higher Trust and Ethical Safeguarding of Autonomous Systems
Authors:
Dasa Kusnirakova,
Barbora Buhnova
Abstract:
With the increasing complexity of software permeating critical domains such as autonomous driving, new challenges are emerging in the ways the engineering of these systems needs to be rethought. Autonomous driving is expected to continue gradually overtaking all critical driving functions, which is adding to the complexity of the certification of autonomous driving systems. As a response, certific…
▽ More
With the increasing complexity of software permeating critical domains such as autonomous driving, new challenges are emerging in the ways the engineering of these systems needs to be rethought. Autonomous driving is expected to continue gradually overtaking all critical driving functions, which is adding to the complexity of the certification of autonomous driving systems. As a response, certification authorities have already started introducing strategies for the certification of autonomous vehicles and their software. But even with these new approaches, the certification procedures are not fully catching up with the dynamism and unpredictability of future autonomous systems, and thus may not necessarily guarantee compliance with all requirements imposed on these systems. In this paper, we identified a number of issues with the proposed certification strategies, which may impact the systems substantially. For instance, we emphasize the lack of adequate reflection on software changes occurring in constantly changing systems, or low support for systems' cooperation needed for the management of coordinated moves. Other shortcomings concern the narrow focus of the awarded certification by neglecting aspects such as the ethical behavior of autonomous software systems. The contribution of this paper is threefold. First, we discuss the motivation for the need to modify the current certification processes for autonomous driving systems. Second, we analyze current international standards used in the certification processes towards requirements derived from the requirements laid on dynamic software ecosystems and autonomous systems themselves. Third, we outline a concept for incorporating the missing parts into the certification procedure.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Interoperability-oriented Quality Assessment for Czech Open Data
Authors:
Dasa Kusnirakova,
Mouzhi Ge,
Leonard Walletzky,
Barbora Buhnova
Abstract:
With the rapid increase of published open datasets, it is crucial to support the open data progress in smart cities while considering the open data quality. In the Czech Republic, and its National Open Data Catalogue (NODC), the open datasets are usually evaluated based on their metadata only, while leaving the content and the adherence to the recommended data structure to the sole responsibility…
▽ More
With the rapid increase of published open datasets, it is crucial to support the open data progress in smart cities while considering the open data quality. In the Czech Republic, and its National Open Data Catalogue (NODC), the open datasets are usually evaluated based on their metadata only, while leaving the content and the adherence to the recommended data structure to the sole responsibility of the data providers. The interoperability of open datasets remains unknown. This paper therefore aims to propose a novel content-aware quality evaluation framework that assesses the quality of open datasets based on five data quality dimensions. With the proposed framework, we provide a fundamental view on the interoperability-oriented data quality of Czech open datasets, which are published in NODC. Our evaluations find that domain-specific open data quality assessments are able to detect data quality issues beyond traditional heuristics used for determining Czech open data quality, increase their interoperability, and thus increase their potential to bring value for the society. The findings of this research are beneficial not only for the case of the Czech Republic, but also can be applied in other countries that intend to enhance their open data quality evaluation processes.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
Beyond Classroom: Making a Difference in Diversity in Tech
Authors:
Barbora Buhnova
Abstract:
With all the opportunities and risks that technology holds in connection to our safe and sustainable future, it is becoming increasingly important to involve a larger portion of our society in becoming active co-creators of our digitalized future -- moving from the passenger seat to the driver seat. Yet, despite extensive efforts around the world, little progress has been made in growing the repre…
▽ More
With all the opportunities and risks that technology holds in connection to our safe and sustainable future, it is becoming increasingly important to involve a larger portion of our society in becoming active co-creators of our digitalized future -- moving from the passenger seat to the driver seat. Yet, despite extensive efforts around the world, little progress has been made in growing the representation of certain communities and groups in software engineering. This chapter shares one successful project, called Czechitas, triggering a major social change in Czechia, involving 1 000+ volunteers to support 50 000+ women on their way towards software engineering education and career.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Trust Management in the Internet of Everything
Authors:
Barbora Buhnova
Abstract:
Digitalization is leading us towards a future where people, processes, data and things are not only interacting with each other, but might start forming societies on their own. In these dynamic systems enhanced by artificial intelligence, trust management on the level of human-to-machine as well as machine-to-machine interaction becomes an essential ingredient in supervising safe and secure progre…
▽ More
Digitalization is leading us towards a future where people, processes, data and things are not only interacting with each other, but might start forming societies on their own. In these dynamic systems enhanced by artificial intelligence, trust management on the level of human-to-machine as well as machine-to-machine interaction becomes an essential ingredient in supervising safe and secure progress of our digitalized future. This tutorial paper discusses the essential elements of trust management in complex digital ecosystems, guiding the reader through the definitions and core concepts of trust management. Furthermore, it explains how trust-building can be leveraged to support people in safe interaction with other (possibly autonomous) digital agents, as trust governance may allow the ecosystem to trigger an auto-immune response towards untrusted digital agents, protecting human safety.
△ Less
Submitted 26 March, 2023; v1 submitted 27 December, 2022;
originally announced December 2022.
-
CopAS: A Big Data Forensic Analytics System
Authors:
Martin Macak,
Matus Stovcik,
Tomas Rebok,
Mouzhi Ge,
Bruno Rossi,
Barbora Buhnova
Abstract:
With the advancing digitization of our society, network security has become one of the critical concerns for most organizations. In this paper, we present CopAS, a system targeted at Big Data forensics analysis, allowing network operators to comfortably analyze and correlate large amounts of network data to get insights about potentially malicious and suspicious events. We demonstrate the practica…
▽ More
With the advancing digitization of our society, network security has become one of the critical concerns for most organizations. In this paper, we present CopAS, a system targeted at Big Data forensics analysis, allowing network operators to comfortably analyze and correlate large amounts of network data to get insights about potentially malicious and suspicious events. We demonstrate the practical usage of CopAS for insider attack detection on a publicly available PCAP dataset and show how the system can be used to detect insiders hiding their malicious activity in the large amounts of data streams generated during the operations of an organization within the network.
△ Less
Submitted 3 April, 2023; v1 submitted 9 December, 2022;
originally announced December 2022.
-
Forensic-Ready Risk Management Concepts
Authors:
Lukas Daubner,
Martin Macak,
Raimundas Matulevičius,
Barbora Buhnova,
Sofija Maksović,
Tomas Pitner
Abstract:
Currently, numerous approaches exist supporting the implementation of forensic readiness and, indirectly, forensic-ready software systems. However, the terminology used in the approaches and their focus tends to vary. To facilitate the design of forensic-ready software systems, the clarity of the underlying concepts needs to be established so that their requirements can be unambiguously formulated…
▽ More
Currently, numerous approaches exist supporting the implementation of forensic readiness and, indirectly, forensic-ready software systems. However, the terminology used in the approaches and their focus tends to vary. To facilitate the design of forensic-ready software systems, the clarity of the underlying concepts needs to be established so that their requirements can be unambiguously formulated and assessed. This is especially important when considering forensic readiness as an add-on to information security. In this paper, the concepts relevant to forensic readiness are derived and aligned based on six existing approaches. The results then serve as a stepping stone for enhancing Information Systems Security Risk Management (ISSRM) with forensic readiness.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation
Authors:
Danny Weyns,
Ilias Gerostathopoulos,
Barbora Buhnova,
Nicolas Cardozo,
Emilia Cioroaica,
Ivana Dusparic,
Lars Grunske,
Pooyan Jamshidi,
Christine Julien,
Judith Michael,
Gabriel Moreno,
Shiva Nejati,
Patrizio Pelliccione,
Federico Quin,
Genaina Rodrigues,
Bradley Schmerl,
Marco Vieira,
Thomas Vogel,
Rebekka Wohlrab
Abstract:
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevan…
▽ More
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevant to industry. This paper provides a set of guidelines for artifacts that aim at supporting industry-relevant research on self-adaptation. The guidelines that are grounded on data obtained from a survey with practitioners were derived during working sessions at the 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Artifact providers can use the guidelines for aligning future artifacts with industry needs; they can also be used to evaluate the industrial relevance of existing artifacts. We also propose an artifact template.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Process Mining Analysis of Puzzle-Based Cybersecurity Training
Authors:
Martin Macak,
Radek Oslejsek,
Barbora Buhnova
Abstract:
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks effectively. However, practical cybersecurity training is strongly process-oriented, making the post-training analysis very difficult. This paper presents process-mining methods applied to the learning analytics workflow. We introduce a unified approach to reconstruct behavioral graphs from sparse event lo…
▽ More
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks effectively. However, practical cybersecurity training is strongly process-oriented, making the post-training analysis very difficult. This paper presents process-mining methods applied to the learning analytics workflow. We introduce a unified approach to reconstruct behavioral graphs from sparse event logs of cyber ranges. Furthermore, we discuss significant data features that affect their practical usability for educational process mining. Based on that, methods of dealing with the complexity of process graphs are presented, taking advantage of the puzzle-based gamification of in-class training sessions.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Women Want to Learn Tech: Lessons from the Czechitas Education Project
Authors:
Barbora Buhnova,
Dita Prikrylova
Abstract:
While it is understood by women that tech fluency might act as a powerful career accelerator or even a new career direction towards software engineering, this awakening often comes after graduation from a different field, when it is difficult for the women to make the shift towards tech and computing. In this paper, we report on our experience with running a successful education non-profit called…
▽ More
While it is understood by women that tech fluency might act as a powerful career accelerator or even a new career direction towards software engineering, this awakening often comes after graduation from a different field, when it is difficult for the women to make the shift towards tech and computing. In this paper, we report on our experience with running a successful education non-profit called Czechitas, which shows that women in their 20s and 30s are (maybe surprisingly) highly interested in learning tech, they just need a helping hand and tailored assistance, encouragement and guidance.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
Modelling System of Systems Interface Contract Behaviour
Authors:
Oldrich Faldik,
Richard Payne,
John Fitzgerald,
Barbora Buhnova
Abstract:
A key challenge in System of Systems (SoS) engineering is the analysis and maintenance of global properties under SoS evolution, and the integration of new constituent elements. There is a need to model the constituent systems composing a SoS in order to allow the analysis of emergent behaviours at the SoS boundary. The Contract pattern allows the engineer to specify constrained behaviours to whic…
▽ More
A key challenge in System of Systems (SoS) engineering is the analysis and maintenance of global properties under SoS evolution, and the integration of new constituent elements. There is a need to model the constituent systems composing a SoS in order to allow the analysis of emergent behaviours at the SoS boundary. The Contract pattern allows the engineer to specify constrained behaviours to which constituent systems are required to conform in order to be a part of the SoS. However, the Contract pattern faces some limitations in terms of its accessibility and suitability for verifying contract compatibility. To address these deficiencies, we propose the enrichment of the Contract pattern, which hitherto has been defined using SysML and the COMPASS Modelling Language (CML), by utilising SysML and Object Constraint Language (OCL). In addition, we examine the potential of interface automata, a notation for improving loose coupling between interfaces of constituent systems defined according to the contract, as a means of enabling the verification of contract compatibility. The approach is demonstrated using a case study in audio/video content streaming.
△ Less
Submitted 20 March, 2017;
originally announced March 2017.
-
Proceedings of the 13th International Workshop on Formal Engineering Approaches to Software Components and Architectures
Authors:
Jana Kofroň,
Jana Tumova,
Bara Buhnova
Abstract:
The aim of the FESCA workshop is to bring together junior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for software engineering.
In recent years, the growing importance of functional correctness and the increased rel…
▽ More
The aim of the FESCA workshop is to bring together junior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for software engineering.
In recent years, the growing importance of functional correctness and the increased relevance of system quality properties (e.g. performance, reliability, security) have stimulated the emergence of analytical and modelling techniques for the design and development of software systems. With the increasing complexity and utilization of today's software systems, FESCA aims at addressing two research questions: (1) what role is played by the software design phase in the systematic addressing of the analytical and modelling challenges, and (2) how can formal and semi-formal techniques be effectively applied to make the issues easier to address automatically, with lower human intervention. We encourage submissions on (semi-)formal techniques and their application that aid analysis, design and implementation of software applications, especially those employed in interconnected, communicating devices, devices interacting with the physical world, and cyber-physical systems.
△ Less
Submitted 28 March, 2016;
originally announced March 2016.
-
Proceedings 12th International Workshop on Formal Engineering approaches to Software Components and Architectures
Authors:
Bara Buhnova,
Lucia Happe,
Jan Kofroň
Abstract:
The aim of the FESCA workshop is to bring together junior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for software engineering.
In recent years, the growing importance of functional correctness and the increased relev…
▽ More
The aim of the FESCA workshop is to bring together junior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for software engineering.
In recent years, the growing importance of functional correctness and the increased relevance of system quality properties (e.g. performance, reliability, security) have stimulated the emergence of analytical and modelling techniques for the design and development of software systems. With the increasing complexity of today's software systems, FESCA aims at addressing two research questions: (1) what role the software architecture can play in systematic addressing of the analytical and modelling challenges, and (2) how formal and semi-formal techniques can be applied effectively to make the issues easier to address automatically, with lower human intervention.
△ Less
Submitted 14 March, 2015;
originally announced March 2015.
-
Proceedings 11th International Workshop on Formal Engineering approaches to Software Components and Architectures
Authors:
Bara Buhnova,
Lucia Happe,
Jan Kofroň
Abstract:
The aim of the FESCA workshop is to bring together both young and senior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for component-based software engineering.
Component-based software design has received considerable…
▽ More
The aim of the FESCA workshop is to bring together both young and senior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for component-based software engineering.
Component-based software design has received considerable attention in industry and academia in the past decade. In recent years, with the emergence of new platforms (such as smartphones), new areas advocating software correctness along with new challenges have appeared. These include development of new methods and adapting existing ones to accommodate unique features of the platforms, such as inherent distribution, openness, and continuous migration. On the other hand, with the growing power of computers, more and more is possible with respect to practical applicability of modelling and specification methods as well as verification tools to real-life software, i.e, to scale to more complex systems.
FESCA aims to address the open question of how formal methods can be applied effectively to these new contexts and challenges. The workshop is interested in both the development and application of formal methods in component-based development and tries to cross-fertilize their research and application.
△ Less
Submitted 1 April, 2014;
originally announced April 2014.
-
Proceedings 10th International Workshop on Formal Engineering Approaches to Software Components and Architectures
Authors:
Barbora Buhnova,
Lucia Happe,
Jan Kofroň
Abstract:
These are the proceedings of the 10th International Workshop on Formal Engineering approaches to Software Components and Architectures (FESCA). The workshop was held on March 23, 2013 in Rome (Italy) as a satellite event to the European Joint Conference on Theory and Practice of Software (ETAPS'13).
The aim of the FESCA workshop is to bring together both young and senior researchers from formal…
▽ More
These are the proceedings of the 10th International Workshop on Formal Engineering approaches to Software Components and Architectures (FESCA). The workshop was held on March 23, 2013 in Rome (Italy) as a satellite event to the European Joint Conference on Theory and Practice of Software (ETAPS'13).
The aim of the FESCA workshop is to bring together both young and senior researchers from formal methods, software engineering, and industry interested in the development and application of formal modelling approaches as well as associated analysis and reasoning techniques with practical benefits for component-based software engineering.
FESCA aims to address the open question of how formal methods can be applied effectively to these new contexts and challenges. FESCA is interested in both the development and application of formal methods in component-based development and tries to cross-fertilize their research and application.
△ Less
Submitted 19 February, 2013;
originally announced February 2013.