Abstract

AbstractTrusted computing is a complex and multidimensional issue, and its application to embedded systems has some particularities not found in business and desktop computing. Trust for embedded systems differs from traditional trust because these systems have physical accessibility, resource constraints and real‐time requirements.In this paper, we describe the approach followed to specify trust requirements for the ITEA2 project TECOM (Trusted Embedded Computing)1. Using these requirements, the project partners developed embedded systems in diverse areas such as home control, video surveillance, digital content delivery, automotive, and communications gateways for remote maintenance.The approach for the engineering of trust requirements presented here is based on two principles: a common conceptual model to identify the trust concepts for embedded systems and their relationships, and a well‐defined process to elicit and specify embedded systems requirements.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call