Modeling Medical System Threats with Conditional Probabilities Using Multiple-Valued Logic Decision Diagrams

Design for medical system reliability has become an area of increasing importance. Medical system threats, which include system failures as well as malicious attacks, often have interdependent events that can adversely affect system operation. To address these problems, we build upon our previous threat cataloging methodology such that a large number of interdependent threats can be efficiently cataloged and analyzed for common features. Our approach utilizes Multiple-Valued Logic for describing the state of a large system and a multiple-valued decision diagram (MDD) for the threat catalog and analysis.

[1]  D. Michael Miller,et al.  Multiple Valued Logic: Concepts and Representations , 2008, Multiple Valued Logic.

[2]  Rolf Drechsler,et al.  Implementing a multiple-valued decision diagram package , 1998, Proceedings. 1998 28th IEEE International Symposium on Multiple- Valued Logic (Cat. No.98CB36138).

[3]  Robert V. Brill,et al.  Applied Statistics and Probability for Engineers , 2004, Technometrics.

[4]  Mingxiao Jiang,et al.  A quantitative approach for medical device Health Hazard Analysis , 2011, 2011 Proceedings - Annual Reliability and Maintainability Symposium.

[5]  Sofia Cassel,et al.  Graph-Based Algorithms for Boolean Function Manipulation , 2012 .

[6]  A. Slonim,et al.  Assessing patient safety risk before the injury occurs: an introduction to sociotechnical probabilistic risk modelling in health care , 2003, Quality & safety in health care.

[7]  John D. Andrews,et al.  Choosing a heuristic for the "fault tree to binary decision diagram" conversion, using neural networks , 2002, IEEE Trans. Reliab..

[8]  David L. Cooke,et al.  Probabilistic Fault Tree Analysis of a Radiation Treatment System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[9]  Rasa Remenyte-Prescott,et al.  A simple component connection approach for fault tree conversion to binary decision diagram , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[10]  S. Nair,et al.  Cyber threat trees for large system threat cataloging and analysis , 2010, 2010 IEEE International Systems Conference.

[11]  Theodore W. Manikas,et al.  Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities , 2011, 2011 41st IEEE International Symposium on Multiple-Valued Logic.

[12]  W E Vesely,et al.  Fault Tree Handbook , 1987 .

[13]  Mitchell A. THORNTON,et al.  IT Application Downtime , Executive Visibility and Disaster Tolerant Computing , 2005 .

[14]  Olexandr Yevkin Truncation approach with the decomposition method for system reliability analysis , 2009, 2009 Annual Reliability and Maintainability Symposium.

[15]  J Gauthier,et al.  Assessment of large automatically generated fault trees by means of binary decision diagrams , 2007 .

[16]  Liudong Xing,et al.  A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems , 2009, IEEE Transactions on Dependable and Secure Computing.

[17]  Charles Vincent,et al.  Human reliability analysis in healthcare: A review of techniques , 2004 .

[18]  John D. Andrews,et al.  A fault tree analysis strategy using binary decision diagrams , 2002, Reliab. Eng. Syst. Saf..

[19]  Bryan J Weiner,et al.  Quality improvement implementation and hospital performance on quality indicators. , 2006, Health services research.

[20]  Mitchell A. THORNTON,et al.  Disaster Tolerant Computer and Communication Systems , 2005 .

[21]  Douglas C. Montgomery,et al.  Applied Statistics and Probability for Engineers, Third edition , 1994 .

[22]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[23]  John R Grout Preventing medical errors by designing benign failures. , 2003, Joint Commission journal on quality and safety.