Formal specification of wireless and pervasive healthcare applications

Wireless and pervasive healthcare applications typically present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. In contrast to the case of classic safety critical applications, the behavior of wireless and pervasive applications is affected by the movements and location of users and resources. This article presents a methodology to formally express requirements in safety critical wireless and pervasive healthcare applications in order to achieve a higher degree of dependability. In particular, it will be shown how it is possible to formalize and constrict mobility characteristics by combining, and in some cases extending, several formal methods. The article also describes a rigorous specification process. Finally, it concludes with a case study of a real safety critical pervasive healthcare application that is going to be deployed in a city hospital.

[1]  Bertrand Meyer,et al.  Applying 'design by contract' , 1992, Computer.

[2]  Walter F. Tichy,et al.  Comments on "Formal Methods Application: An Empirical Tale of Software Development" , 2003, IEEE Trans. Software Eng..

[3]  Supratik Mukhopadhyay,et al.  Model checking mobile ambients , 2003, Theor. Comput. Sci..

[4]  Jonathan P. Bowen,et al.  Ten Commandments of Formal Methods... Ten Years On , 2012, Conquering Complexity.

[5]  Luca Cardelli,et al.  Anytime, anywhere: modal logics for mobile ambients , 2000, POPL '00.

[6]  Chwan-Lu Tseng,et al.  A Mobile Care System With Alert Mechanism , 2007, IEEE Transactions on Information Technology in Biomedicine.

[7]  Jonathan P. Bowen,et al.  Ten Commandments of Formal Methods ...Ten Years Later , 2006, Computer.

[8]  Roy H. Campbell,et al.  Provably Correct Pervasive Computing Environments , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[9]  Dino Mandrioli,et al.  Formal Methods for Real-Time Computing , 1996 .

[10]  C. A. R. Hoare,et al.  An axiomatic basis for computer programming , 1969, CACM.

[11]  Goutam Kumar Saha,et al.  Software fault avoidance issues , 2006, UBIQ.

[12]  Jonathan P. Bowen,et al.  Formal Methods and Software Safety , 1992 .

[13]  Klara Nahrstedt,et al.  A Middleware Infrastructure for Active Spaces , 2002, IEEE Pervasive Comput..

[14]  Petru Eles,et al.  Formal verification of component-based designs , 2007, Des. Autom. Embed. Syst..

[15]  Michael R. Clarkson,et al.  Response to "Comments on 'Formal Methods Application: An Empirical Tale of Software Development'" , 2003, IEEE Trans. Software Eng..

[16]  Jonathan P. Bowen,et al.  Ten Commandments of Formal Methods , 1995, Computer.

[17]  Nicola Guarino,et al.  Formal ontology, conceptual analysis and knowledge representation , 1995, Int. J. Hum. Comput. Stud..

[18]  Luca Cardelli,et al.  Mobile Ambients , 1998, FoSSaCS.

[19]  Klara Nahrstedt,et al.  Gaia: A Middleware Infrastructure to Enable Active Spaces1 , 2002 .

[20]  Michael R. Clarkson,et al.  Formal Methods Application: An Empirical Tale of Software Development , 2002, IEEE Trans. Software Eng..

[21]  Robin Milner The Pi calculus and its applications , 1997, ICLP 1998.

[22]  Joerg Evermann,et al.  Toward formalizing domain modeling semantics in language syntax , 2005, IEEE Transactions on Software Engineering.