Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

Show image information

T 3 - Demand-oriented system engineering

T3.1 Traceability

The traceability of requirements or changes in intelligent technical systems (e.g. Cyber-Physical Systems) across the various disciplines/development phases represents an enormous challenge for requirements management. The Fortschrittskolleg has already developed the concept of a unifying metamodel across disciplinary boundaries. Against this background, AI-based assistance systems promise enormous potential benefits for supporting requirements management.
These understand the intention of the user, derive the task to be solved and interact with the user in different ways.
Against this background, the corresponding potentials shall be identified. In addition, concepts for the integration of assistance systems into engineering processes for automation and support of suitable work tasks are to be developed.

Ansprechpartner: Prof. Dr. Roman Dumitrescu, Heinz Nixdorf Institut, roman.dumitrescu[at], Universität Paderborn

T3.2 Personal Data in Networked Cyber-Physical Systems

The digitalization of the working world is based on the networking of all entities, which means an increasing flow of information between people and machines. The information that is generated directly or indirectly, be it from internal process data, sensor data from machines or from the user himself, forms the starting point for the digital image of the user (digital twin). In the past, methods that use sensor data to record specific workloads have been presented in the Progress College. In order to make use of the advantages of such developments for employees, the aspect of data sovereignty must already be considered during system design.
In concrete terms, the following questions are to be answered: What does the system (the machine) need to know from the user in order to ensure safe and efficient interaction? What can the system know about the user (through interaction)? How reliable are the interaction data and which possibilities does the user have to take self-determined influence? Who owns the data and how is it used and secured?

Contact: Prof. Dr.-Ing. Ulrich Rückert, CITEC, rueckert[at], Universität Bielefeld

T3.3 Architectural security analysis of cyber-physical-social systems

In this work field, methods for threat modelling and architectural security analysis for CPS developed in the Fortschrittkolleg were extended so that they can be applied to cyber-physical-social systems (CPSS). For the first time inherent humans are considered as important factors of the overall system. Using a digital twin, people are modelled in different roles. For example, they can promote IT security by implementing countermeasures against attacks, but can also trigger security incidents as internal perpetrators. Previous methods of architectural security analysis generally do not consider such factors. This neglects important attack vectors, e.g. statistically about 40% of all cyber security incidents are caused by internal perpetrators. The systematic modelling of the human factor should therefore provide a realistic assessment of the threat situation and lead to architectures that can safely ward off these threats.

Contact: Prof. Dr. Eric Bodden, Heinz Nixdorf Institut, eric.bodden [at], Universität Paderborn

The University for the Information Society