Govindan, K. and Mohapatra, P. (2011). Trust computa-
tions and trust dynamics in mobile adhoc networks: A
survey. IEEE Communications Surveys & Tutorials,
14(2):279–298.
Greamo, C. and Ghosh, A. (2011). Sandboxing and virtual-
ization: Modern tools for combating malware. IEEE
Security Privacy, 9(2):79–82.
Halasz, D. (2022). From systems to ecosystems: Rethink-
ing adaptive safety. In 17th International Sympo-
sium on Software Engineering for Adaptive and Self-
Managing Systems (SEAMS ’22). IEEE.
Halasz, D. and Buhnova, B. (2022). Rethinking safety
in autonomous ecosystems. In The 17th Conference
on Computer Science and Intelligence Systems, pages
81–87. IEEE.
Iqbal, D. and Buhnova, B. (2022). Model-based approach
for building trust in autonomous drones through digi-
tal twins. In 2022 IEEE International Conference on
Systems, Man, and Cybernetics (SMC). IEEE.
Jahan, F., Sun, W., Niyaz, Q., and Alam, M. (2019). Secu-
rity modeling of autonomous systems: A survey. ACM
Comput. Surv., 52(5).
Kusnirakova, D. and Buhnova, B. (2023). Rethinking
certification for higher trust and ethical safeguard-
ing of autonomous systems. In Proceedings of
the 18th International Conference on Evaluation of
Novel Approaches to Software Engineering (ENASE).
Scitepress.
Lahno, B. (2001). On the emotional character of trust. Eth-
ical theory and moral practice, 4(2):171–189.
Laverty, J. P., Wood, D. F., Kohun, F. G., and Turchek, J.
(2011). Comparative analysis of mobile application
development and security models. Issues in Informa-
tion Systems, 12(1):301–312.
Li, G., Yang, Y., Zhang, T., Qu, X., Cao, D., Cheng, B.,
and Li, K. (2021). Risk assessment based collision
avoidance decision-making for autonomous vehicles
in multi-scenarios. Transportation Research Part C:
Emerging Technologies, 122:102820.
Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995).
An integrative model of organizational trust. The
Academy of Management Review, 20(3):709–734.
McKinley, P., Sadjadi, S., Kasten, E., and Cheng, B. (2004).
Composing adaptive software. Computer, 37(7):56–
64.
Neuner, S., van der Veen, V., Lindorfer, M., Huber, M.,
Merzdovnik, G., Mulazzani, M., and Weippl, E. R.
(2014). Enter sandbox: Android sandbox comparison.
CoRR, abs/1410.7749.
Nguyen, K., Drew, S., Huang, C., and Zhou, J. (2022).
Parked vehicles task offloading in edge computing.
IEEE Access, 10:41592–41606.
Pivoto, D. G., de Almeida, L. F., da Rosa Righi, R., Ro-
drigues, J. J., Lugli, A. B., and Alberti, A. M. (2021).
Cyber-physical systems architectures for industrial in-
ternet of things applications in industry 4.0: A lit-
erature review. Journal of manufacturing systems,
58:176–192.
Ramos, M. A., Thieme, C. A., Utne, I. B., and Mosleh,
A. (2019). Autonomous systems safety–state of the
art and challenges. In Proceedings of the First In-
ternational Workshop on Autonomous Systems Safety.
NTNU.
Rosen, R., Von Wichert, G., Lo, G., and Bettenhausen,
K. D. (2015). About the importance of autonomy and
digital twins for the future of manufacturing. Ifac-
papersonline, 48(3):567–572.
Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and
gullibility. American psychologist, 35(1):1.
Sagar, S., Mahmood, A., Sheng, Q. Z., Pabani, J. K., and
Zhang, W. E. (2022). Understanding the trustworthi-
ness management in the social internet of things: A
survey. arXiv preprint arXiv:2202.03624.
Sahoo, J., Mohapatra, S., and Lath, R. (2010). Virtualiza-
tion: A survey on concepts, taxonomy and associated
security issues. In 2010 Second International Con-
ference on Computer and Network Technology, pages
222–226.
Sandu, C. and Susnea, I. (2021). Edge computing for au-
tonomous vehicles-a scoping review. In 2021 20th
RoEduNet Conference: Networking in Education and
Research (RoEduNet), pages 1–5. IEEE.
Seto, D., Krogh, B., Sha, L., and Chutinan, A. (1998). The
simplex architecture for safe online control system up-
grades. In Proceedings of the 1998 American Control
Conference. ACC (IEEE Cat. No.98CH36207), vol-
ume 6, pages 3504–3508 vol.6.
Sha, L. (2001). Using simplicity to control complexity.
IEEE Software, 18(4):20–28.
Tang, S., Chen, B., Iwen, H., Hirsch, J., Fu, S., Yang,
Q., Palacharla, P., Wang, N., Wang, X., and Shi,
W. (2021). Vecframe: A vehicular edge computing
framework for connected autonomous vehicles. In
2021 IEEE International Conference on Edge Com-
puting (EDGE), pages 68–77. IEEE.
Taylor, A. J. and Ames, A. D. (2020). Adaptive safety with
control barrier functions. In 2020 American Control
Conference (ACC), pages 1399–1405.
Tian, J.-S., Huang, S.-C., Yang, S.-R., and Lin, P. (2022).
Kubernetes edge-powered vision-based navigation as-
sistance system for robotic vehicles. In 2022 Interna-
tional Wireless Communications and Mobile Comput-
ing (IWCMC), pages 457–462. IEEE.
Waldspurger, C. and Rosenblum, M. (2012). I/o virtualiza-
tion. Communications of the ACM, 55(1):66–73.
Yang, C.-T., Liu, J.-C., Wang, H.-Y., and Hsu, C.-H. (2014).
Implementation of gpu virtualization using pci pass-
through mechanism. The Journal of Supercomputing,
68:183–213.
Conceptual Framework for Adaptive Safety in Autonomous Ecosystems
403