Abstract
Wireless and pervasive healthcare applications typically present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. In contrast to the case of classic safety critical applications, the behavior of wireless and pervasive applications is affected by the movements and location of users and resources.
This article presents a methodology to formally express requirements in safety critical wireless and pervasive healthcare applications in order to achieve a higher degree of dependability. In particular, it will be shown how it is possible to formalize and constrict mobility characteristics by combining, and in some cases extending, several formal methods. The article also describes a rigorous specification process. Finally, it concludes with a case study of a real safety critical pervasive healthcare application that is going to be deployed in a city hospital.
- Berry, D. M. and Tichy, W. F. 2003. Comments on formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 29, 6. Google Scholar
Digital Library
- Bowen, J. P. and Hinchey, M. G. 1995. Ten commandments of formal Methods. IEEE Computer 28, 4, 56--63. Google Scholar
Digital Library
- Bowen, J. P. and Hinchey, M. G. 2006. Ten commandments of formal methods …ten years later. IEEE Computer 39, 1, 40--48. Google Scholar
Digital Library
- Bowen, J. P. and Stavridou, V. 1992. Formal Methods and Software Safety. Pergamon Press.Google Scholar
- Campbell, R. and Ranganathan, A. 2008. Provably correct pervasive computing environments. In Proceedings of the International Conference on Pervasive Computing (PerCom), 2008. Google Scholar
Digital Library
- Cardelli, L. and Gordon, A. D. 2000a. Ambient logic. Theor. Comput. Sci. 240, 1.Google Scholar
Digital Library
- Cardelli, L. and Gordon, A. 2000b. Anytime, anywhere modal logics for mobile ambients. In Proceedings of the 27th ACM Symposium on Principles of Programming Languages. Google Scholar
Digital Library
- Charatonik, W., Zilio, S. D., Gordon, A. D., Mukhopadhyay, S., and Talbot, J. 2003. Model checking mobile ambients. Theor. Comput. Sci. 308, 277--331. Google Scholar
Digital Library
- Evermann, J. and Wand, Y. 2005. Toward formalizing domain modeling semantics in language syntax. IEEE Trans. Softw. Engin. 31, 1. Google Scholar
Digital Library
- Guarino, N. 1995. Formal ontology, conceptual analysis and knowledge representation. Inter. J. Hum.-Comput. Studies. Special Issue on Formal Ontology, Conceptual Analysis and Knowledge Representation 43, 625--640. Google Scholar
Digital Library
- Heitmeyer, C. and Mandrioli, D. 2004. Formal Methods for Real-Time Computing. John Wiley & Sons. Google Scholar
Digital Library
- Hoare, C. A. R. 1969. An axiomatic basis for computer programming, Comm. ACM 12, 10. Google Scholar
Digital Library
- Karlsson, D., Eles, P., and Peng, Z. 2007. Formal verification of component-based designs, J. Design Automat. Embed. Syst. 11, 1.Google Scholar
- Kelley Sobel, A. E. and Clarkson, M. L. 2002. Formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 28, 3. Google Scholar
Digital Library
- Kelley Sobel, A. E. and Clarkson, M. L. 2003. Response to comments on formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 29, 6. Google Scholar
Digital Library
- Lee, R. G., Chen, K. C., Hsiao, C. C., and Tseng C. L. 2007 A mobile care system with alert mechanism. IEEE Trans. Inform. Technol. Biomed. 11, 5. Google Scholar
Digital Library
- Meyer, B. 1992. Applying design by contract, IEEE Comput. 25, 10. Google Scholar
Digital Library
- Milner, R. 1998. The pi calculus and its applications. In Proceedings of the Joint International Conference and Symposium on Logic Programming, Google Scholar
Digital Library
- Roman, M., Hess, C. K., Cerqueira, R., Ranganathan, A., Campbell, R. H., and Narhstedt K. 2002. Gaia: A middleware infrastructure to enable active spaces. IEEE Pervasive Comput. 1, 4, 74--83. Google Scholar
Digital Library
- Saha, G. K. 2006. Software fault avoidance issues. ACM Ubiquity 7, 46, 1--15. Google Scholar
Digital Library
Index Terms
Formal specification of wireless and pervasive healthcare applications
Recommendations
Formal Specification and Verification of Ubiquitous and Pervasive Systems
This article presents a methodology to formally express requirements in safety-critical ubiquitous and pervasive applications in order to achieve a higher degree of dependability. In particular, it will be shown how it is possible to formalize and ...
Formal specification of real-time dependable systems
ICECCS '95: Proceedings of the 1st International Conference on Engineering of Complex Computer SystemsThe complex and critical nature of real-time, dependable systems (henceforth referred to as RTD systems) necessitates the use of analyzable specifications and specification analysis techniques supporting the assessment of behavioral, safety-critical, ...
Pervasive healthcare and wireless health monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare applications. This could fulfill the vision of "Pervasive Healthcare" or ...






Comments