propose two important mechanisms to control the se-
curity in pools. Finally their implementation is ap-
plied to a Body-Monitoring system (BMS). The fu-
ture work will deal with the flexibility in the network
that links different devices of RA2DL-based systems.
In addition, we will be interested either in the different
real-time aspects of RA2DL or in the run-time tests of
components once deployed on the target devices.
REFERENCES
Adaili, F., Mosbahi, O., Khalgui, M., and Bouzefrane, S.
(2015). New solutions for useful execution models
of communicating adaptive ra2dl. In Intelligent Soft-
ware Methodologies, Tools and Techniques, volume
532, pages 87–101. Springer International Publishing.
Bengtsson, J., Larsen, K., Larsson, F., Pettersson, P., and Yi,
W. (1996). Uppaal: A tool suite for automatic verifica-
tion of real-time systems. pages 232–243, Secaucus,
NJ, USA. Springer-Verlag New York, Inc.
Bernstein, D. (2014). Containers and cloud: From lxc
to docker to kubernetes. Cloud Computing, IEEE,
1(3):81–84.
Bielikov, M. (October 2002). A body-monitoring system
with eeg and eog sensors. Journal of ERCIM News
No. 49.
Brereton, P. and Budgen, D. (2000). Component-based sys-
tems: a classification of issues. Computer, 33(11):54–
62.
Cai, X., Lyu, M., Wong, K.-F., and Ko, R. (2000).
Component-based software engineering: technolo-
gies, development frameworks, and quality assur-
ance schemes. In Software Engineering Confer-
ence, 2000. APSEC 2000. Proceedings. Seventh Asia-
Pacific, pages 372–379.
Clements, P. C. (1996). A survey of architecture descrip-
tion languages. In Proceedings of the 8th Interna-
tional Workshop on Software Specification and De-
sign, IWSSD ’96, pages 16–, Washington, DC, USA.
IEEE Computer Society.
elena Rugina, A., Kanoun, K., and Kaniche, M. (2006).
An architecture-based dependability modeling frame-
work using aadl. In In 10th IASTED International
Conference on Software Engineering and Applica-
tions SEA2006.
F.Adaili, O.Mosbahi, M.Khalgui, and S.Bouzefrane (2015).
Ra2dl: New flexible solution for adaptive aadl-based
control components. In Proceedings of the 5th In-
ternational Conference on Pervasive and Embedded
Computing and Communication Systems, pages 247–
258.
Hansson, J., Feiler, P. H., and Morley, J. (2008). Building
secure systems using model-based engineering and ar-
chitectural models. CrossTalk: The Journal of De-
fense Software Engineering, 21(9).
Husemann, D., Steinbugler, R., and Striemer, B. (2004).
Body monitoring using local area wireless interfaces.
US Patent App. 10/406,865.
J. Alves-Foss, W. S. Harrison, P. O. and Taylor, C. (2006).
The mils architecture for high assurance embedded
systems. International Journal of Embedded Systems.
J
¨
urjens, J. (2002). Umlsec: Extending uml for secure sys-
tems development. In Proceedings of the 5th Inter-
national Conference on The Unified Modeling Lan-
guage, UML ’02, pages 412–425, London, UK, UK.
Springer-Verlag.
Kocher, P., Lee, R., McGraw, G., and Raghunathan, A.
(2004). Security as a new dimension in embedded
system design. In Proceedings of the 41st Annual De-
sign Automation Conference, DAC ’04, pages 753–
760, New York, NY, USA. ACM. Moderator-Ravi,
Srivaths.
Mouratidis, H., Kolp, M., Faulkner, S., and Giorgini, P.
(2005). A secure architectural description language
for agent systems. In Proceedings of the Fourth In-
ternational Joint Conference on Autonomous Agents
and Multiagent Systems, AAMAS ’05, pages 578–
585, New York, NY, USA. ACM.
MS, A. (2008). Security needs in embedded sys-
tems. Cryptology ePrint Archive, Report 2008/198.
http://eprint.iacr.org/.
Ray, A. and Cleaveland, R. (2006). A software architec-
tural approach to security by design. In 30th An-
nual International Computer Software and Applica-
tions Conference, COMPSAC 2006, Chicago, Illinois,
USA, September 17-21, 2006. Volume 2, pages 83–86.
Ren, J. and Taylor, R. (2005). A secure software architec-
ture description language. In Workshop on Software
Security Assurance Tools, Techniques, and Metrics,
pages 82–89.
Salem, M. O. B., Mosbahi, O., Khalgui, M., and Frey,
G. (2015). Zizo: Modeling, simulation and verifica-
tion of reconfigurable real-time control tasks sharing
adaptive resources - application to the medical project
bros. In Proceedings of the International Conference
on Health Informatics, pages 20–31.
Vergnaud, T., Pautet, L., and Kordon, F. (2005). Using the
aadl to describe distributed applications from middle-
ware to software components. In Reliable Software
Technology - Ada-Europe 2005, 10th Ada-Europe In-
ternational Conference on Reliable Software Tech-
nologies, York, UK, June 20-24, 2005, Proceedings,
pages 67–78.
Yoon, E., Lee, W., and Yoo, K. (2007). Secure pap-
based RADIUS protocol in wireless networks. In Ad-
vanced Intelligent Computing Theories and Applica-
tions. With Aspects of Contemporary Intelligent Com-
puting Techniques, Third International Conference on
Intelligent Computing, ICIC 2007, Qingdao, China,
August 21-24, 2007. Proceedings, pages 689–694.
RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems
111