Architecting Trustworthy Self-Adaptive Systems (Tutorial)

R. Calinescu, Danny Weyns, Simos Gerasimou, I. Habli
{"title":"Architecting Trustworthy Self-Adaptive Systems (Tutorial)","authors":"R. Calinescu, Danny Weyns, Simos Gerasimou, I. Habli","doi":"10.1109/ICSA-C.2019.00008","DOIUrl":null,"url":null,"abstract":"Architecting self-adaptive software systems is challenging. These systems must achieve their goals not only in the environment in which they are deployed initially, but also as this environment changes over time. When self-adaptive systems are used in safety-critical and business-critical applications, this challenge is compounded by the need to also provide guarantees that the system operates correctly at all times. For traditional software systems, such guarantees are provided through assurance cases. These are structured arguments which use comprehensive development-time evidence to explain why a system can be trusted when used for its planned application in a given environment. This tutorial presents the ENTRUST methodology for achieving a similar level of trust in self-adaptive systems [1]. ENTRUST is the first end-to-end methodology for architecting trustworthy self-adaptive systems and dynamic assurance cases guaranteeing the suitability of the software for its intended applications. As advocated by major research initiatives such as the UK-led Assuring Autonomy International Programme (https://www.york.ac.uk/assuring-autonomy/). ENTRUST dynamic assurance cases seamlessly combine evidence obtained during the development of a self-adaptive software system with evidence obtained from its additional verification at runtime. As such, each reconfiguration of an ENTRUST self-adaptive system is accompanied by a new version of the assurance case that confirms the trustworthiness of the reconfigured system architecture.","PeriodicalId":239999,"journal":{"name":"2019 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Software Architecture Companion (ICSA-C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSA-C.2019.00008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Architecting self-adaptive software systems is challenging. These systems must achieve their goals not only in the environment in which they are deployed initially, but also as this environment changes over time. When self-adaptive systems are used in safety-critical and business-critical applications, this challenge is compounded by the need to also provide guarantees that the system operates correctly at all times. For traditional software systems, such guarantees are provided through assurance cases. These are structured arguments which use comprehensive development-time evidence to explain why a system can be trusted when used for its planned application in a given environment. This tutorial presents the ENTRUST methodology for achieving a similar level of trust in self-adaptive systems [1]. ENTRUST is the first end-to-end methodology for architecting trustworthy self-adaptive systems and dynamic assurance cases guaranteeing the suitability of the software for its intended applications. As advocated by major research initiatives such as the UK-led Assuring Autonomy International Programme (https://www.york.ac.uk/assuring-autonomy/). ENTRUST dynamic assurance cases seamlessly combine evidence obtained during the development of a self-adaptive software system with evidence obtained from its additional verification at runtime. As such, each reconfiguration of an ENTRUST self-adaptive system is accompanied by a new version of the assurance case that confirms the trustworthiness of the reconfigured system architecture.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
构建可信的自适应系统(教程)
构建自适应软件系统具有挑战性。这些系统不仅要在最初部署它们的环境中实现它们的目标,而且要在这个环境随时间变化时实现它们的目标。当自适应系统用于安全关键型和业务关键型应用程序时,还需要保证系统在任何时候都能正确运行,这使这一挑战更加复杂。对于传统的软件系统,这种保证是通过保证案例提供的。这些是结构化的论证,使用全面的开发时间证据来解释为什么在给定环境中将系统用于其计划的应用程序时可以信任系统。本教程介绍了在自适应系统[1]中实现类似级别信任的委托方法。委托是第一个端到端的方法,用于构建可信赖的自适应系统和动态保证案例,以保证软件对其预期应用程序的适用性。英国领导的“保证自治国际计划”(https://www.york.ac.uk/assuring-autonomy/)等主要研究项目都在倡导这一点。委托动态保证案例无缝地将自适应软件系统开发过程中获得的证据与运行时额外验证获得的证据结合起来。因此,每次重新配置委托自适应系统都伴随着一个新版本的保证案例,以确认重新配置的系统架构的可信性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Retargetable Fault Injection Framework for Safety Validation of Autonomous Vehicles Experience Report: Combining Mixed-Criticality Support with Resource Reservation and Spare Capacity Allocation DecidArch V2: An Improved Game to Teach Architecture Design Decision Making Towards Consistency Checking Between Software Architecture and Informal Documentation Machine Learning System Architectural Pattern for Improving Operational Stability
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1