skip to main content
research-article

Formal specification of wireless and pervasive healthcare applications

Published:27 August 2010Publication History
Skip Abstract Section

Abstract

Wireless and pervasive healthcare applications typically present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. In contrast to the case of classic safety critical applications, the behavior of wireless and pervasive applications is affected by the movements and location of users and resources.

This article presents a methodology to formally express requirements in safety critical wireless and pervasive healthcare applications in order to achieve a higher degree of dependability. In particular, it will be shown how it is possible to formalize and constrict mobility characteristics by combining, and in some cases extending, several formal methods. The article also describes a rigorous specification process. Finally, it concludes with a case study of a real safety critical pervasive healthcare application that is going to be deployed in a city hospital.

References

  1. Berry, D. M. and Tichy, W. F. 2003. Comments on formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 29, 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bowen, J. P. and Hinchey, M. G. 1995. Ten commandments of formal Methods. IEEE Computer 28, 4, 56--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bowen, J. P. and Hinchey, M. G. 2006. Ten commandments of formal methods …ten years later. IEEE Computer 39, 1, 40--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bowen, J. P. and Stavridou, V. 1992. Formal Methods and Software Safety. Pergamon Press.Google ScholarGoogle Scholar
  5. Campbell, R. and Ranganathan, A. 2008. Provably correct pervasive computing environments. In Proceedings of the International Conference on Pervasive Computing (PerCom), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cardelli, L. and Gordon, A. D. 2000a. Ambient logic. Theor. Comput. Sci. 240, 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cardelli, L. and Gordon, A. 2000b. Anytime, anywhere modal logics for mobile ambients. In Proceedings of the 27th ACM Symposium on Principles of Programming Languages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Charatonik, W., Zilio, S. D., Gordon, A. D., Mukhopadhyay, S., and Talbot, J. 2003. Model checking mobile ambients. Theor. Comput. Sci. 308, 277--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Evermann, J. and Wand, Y. 2005. Toward formalizing domain modeling semantics in language syntax. IEEE Trans. Softw. Engin. 31, 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Guarino, N. 1995. Formal ontology, conceptual analysis and knowledge representation. Inter. J. Hum.-Comput. Studies. Special Issue on Formal Ontology, Conceptual Analysis and Knowledge Representation 43, 625--640. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Heitmeyer, C. and Mandrioli, D. 2004. Formal Methods for Real-Time Computing. John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hoare, C. A. R. 1969. An axiomatic basis for computer programming, Comm. ACM 12, 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Karlsson, D., Eles, P., and Peng, Z. 2007. Formal verification of component-based designs, J. Design Automat. Embed. Syst. 11, 1.Google ScholarGoogle Scholar
  14. Kelley Sobel, A. E. and Clarkson, M. L. 2002. Formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 28, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kelley Sobel, A. E. and Clarkson, M. L. 2003. Response to comments on formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 29, 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lee, R. G., Chen, K. C., Hsiao, C. C., and Tseng C. L. 2007 A mobile care system with alert mechanism. IEEE Trans. Inform. Technol. Biomed. 11, 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Meyer, B. 1992. Applying design by contract, IEEE Comput. 25, 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Milner, R. 1998. The pi calculus and its applications. In Proceedings of the Joint International Conference and Symposium on Logic Programming, Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Roman, M., Hess, C. K., Cerqueira, R., Ranganathan, A., Campbell, R. H., and Narhstedt K. 2002. Gaia: A middleware infrastructure to enable active spaces. IEEE Pervasive Comput. 1, 4, 74--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Saha, G. K. 2006. Software fault avoidance issues. ACM Ubiquity 7, 46, 1--15. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Formal specification of wireless and pervasive healthcare applications

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!