首页 > 最新文献

Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)最新文献

英文 中文
Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD) 应用基于计算机的系统工程(ECBS)和产品线中心(PLC)方法为国防部(DoD)开发关键任务系统
Roymond S. C. Shanahan
This paper addresses opportunities to apply the ECBS discipline and reuse technology in the DoD information systems development environment and identifies relevant on-going initiatives. The application of ECBS principles, in concert with the reuse of processes, architectures, information, methods, and tools within DoD application domains or product lines, has the potential to significantly reduce DoD systems development costs.
本文讨论了在国防部信息系统开发环境中应用ECBS规程和重用技术的机会,并确定了相关的正在进行的计划。ECBS原则的应用,与国防部应用领域或产品线中的过程、体系结构、信息、方法和工具的重用相一致,具有显著降低国防部系统开发成本的潜力。
{"title":"Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD)","authors":"Roymond S. C. Shanahan","doi":"10.1109/HASE.1996.618569","DOIUrl":"https://doi.org/10.1109/HASE.1996.618569","url":null,"abstract":"This paper addresses opportunities to apply the ECBS discipline and reuse technology in the DoD information systems development environment and identifies relevant on-going initiatives. The application of ECBS principles, in concert with the reuse of processes, architectures, information, methods, and tools within DoD application domains or product lines, has the potential to significantly reduce DoD systems development costs.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122448482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating rare-event failure tolerance: reductions in future uncertainty 调查罕见事件的故障容忍度:减少未来的不确定性
J. Voas, F. Charron, K. Miller
At the 1995 Computer Assurance (COMPASS) conference, Voas and Miller (1995) presented a technique for assessing the failure tolerance of a program when the program was executing in unlikely modes (with respect to the expected operational profile). In that paper, several preliminary algorithms were presented for inverting operational profiles to more easily distinguish the unlikely modes of operation from the likely modes. This paper refines the original algorithms. It then demonstrates the new algorithms being used in conjunction with a failure tolerance assessment technique on two small programs.
在1995年计算机保证(COMPASS)会议上,Voas和Miller(1995)提出了一种技术,用于评估程序在不可能模式下执行时的容错能力(相对于预期的操作情况)。在这篇论文中,提出了一些初步的算法来反演运行曲线,以便更容易地区分不可能的运行模式和可能的运行模式。本文对原有算法进行了改进。然后在两个小程序上演示了与容错评估技术结合使用的新算法。
{"title":"Investigating rare-event failure tolerance: reductions in future uncertainty","authors":"J. Voas, F. Charron, K. Miller","doi":"10.1109/HASE.1996.618568","DOIUrl":"https://doi.org/10.1109/HASE.1996.618568","url":null,"abstract":"At the 1995 Computer Assurance (COMPASS) conference, Voas and Miller (1995) presented a technique for assessing the failure tolerance of a program when the program was executing in unlikely modes (with respect to the expected operational profile). In that paper, several preliminary algorithms were presented for inverting operational profiles to more easily distinguish the unlikely modes of operation from the likely modes. This paper refines the original algorithms. It then demonstrates the new algorithms being used in conjunction with a failure tolerance assessment technique on two small programs.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121906008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mk48 ADCAP torpedo high-assurance testing Mk48 ADCAP鱼雷高保证测试
D. MacPherson
The Mk48 ADCAP torpedo is the US Navy's premier heavyweight submarine-launched torpedo and is widely recognized as the world's most capable anti-submarine weapon. ADCAP is a wire-guided, thermal torpedo launched through the full submarine's depth and speed profile. Following ADCAP's initial fleet introduction in 1988, software upgrades were begun to improve torpedo performance in the presence of countermeasures, under the arctic ice canopy and against high speed submarine targets. The ADCAP program has produced an extremely reliable and capable weapon system through over 16 years of development. Since ADCAP is a software controlled weapon, most performance enhancements require no hardware modification, can be made quickly and at low cost. Obviously, software enhancements must undergo testing before fleet introduction. This paper describes the ADCAP torpedo, the problems encountered during development and current status of the Mk48 ADCAP torpedo testing program.
Mk48 ADCAP鱼雷是美国海军首屈一指的重型潜射鱼雷,被广泛认为是世界上最强大的反潜武器。ADCAP是一种线制导热鱼雷,通过整个潜艇的深度和速度剖面发射。在1988年ADCAP初始舰队引进之后,软件升级开始在对抗措施存在下改进鱼雷性能,在北极冰罩下和对抗高速潜艇目标。ADCAP计划已经通过16年的发展生产了一种极其可靠和有能力的武器系统。由于ADCAP是一种软件控制的武器,大多数性能增强不需要硬件修改,可以快速和低成本地完成。显然,软件增强必须在车队引入之前经过测试。本文介绍了ADCAP鱼雷、研制过程中遇到的问题以及Mk48 ADCAP鱼雷试验方案的现状。
{"title":"Mk48 ADCAP torpedo high-assurance testing","authors":"D. MacPherson","doi":"10.1109/HASE.1996.618555","DOIUrl":"https://doi.org/10.1109/HASE.1996.618555","url":null,"abstract":"The Mk48 ADCAP torpedo is the US Navy's premier heavyweight submarine-launched torpedo and is widely recognized as the world's most capable anti-submarine weapon. ADCAP is a wire-guided, thermal torpedo launched through the full submarine's depth and speed profile. Following ADCAP's initial fleet introduction in 1988, software upgrades were begun to improve torpedo performance in the presence of countermeasures, under the arctic ice canopy and against high speed submarine targets. The ADCAP program has produced an extremely reliable and capable weapon system through over 16 years of development. Since ADCAP is a software controlled weapon, most performance enhancements require no hardware modification, can be made quickly and at low cost. Obviously, software enhancements must undergo testing before fleet introduction. This paper describes the ADCAP torpedo, the problems encountered during development and current status of the Mk48 ADCAP torpedo testing program.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124147675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring quality in distributed multimedia systems 确保分布式多媒体系统的质量
R. Paul, M. F. Khan, Shahab Baqai, A. Ghafoor
The use of multimedia technology can provide cost effective methods for management and dissemination of information, and thus increase economic efficiency. Distributed, networked multimedia information systems will be a critical component of technology-based information infrastructures in the future. Several ground breaking applications have already appeared, and more are expected to follow. Innovations in hardware and software are feeding this revolution. In this paper, the notion of quality for multimedia data transferred over the networks is developed. Multimedia data synchronization requirements are specified to ensure high quality delivery of multimedia information. Accordingly we propose synchronization techniques in a client server environment.
利用多媒体技术可以为信息的管理和传播提供成本效益高的方法,从而提高经济效益。分布式、网络化的多媒体信息系统将成为未来以技术为基础的信息基础设施的关键组成部分。一些突破性的应用已经出现,预计会有更多的应用紧随其后。硬件和软件的创新正在推动这场革命。本文提出了在网络上传输的多媒体数据质量的概念。指定多媒体数据同步要求,以确保高质量的多媒体信息交付。因此,我们提出了客户端服务器环境下的同步技术。
{"title":"Ensuring quality in distributed multimedia systems","authors":"R. Paul, M. F. Khan, Shahab Baqai, A. Ghafoor","doi":"10.1109/HASE.1996.618566","DOIUrl":"https://doi.org/10.1109/HASE.1996.618566","url":null,"abstract":"The use of multimedia technology can provide cost effective methods for management and dissemination of information, and thus increase economic efficiency. Distributed, networked multimedia information systems will be a critical component of technology-based information infrastructures in the future. Several ground breaking applications have already appeared, and more are expected to follow. Innovations in hardware and software are feeding this revolution. In this paper, the notion of quality for multimedia data transferred over the networks is developed. Multimedia data synchronization requirements are specified to ensure high quality delivery of multimedia information. Accordingly we propose synchronization techniques in a client server environment.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123747524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A general approach to secure components composition 保护组件组合的通用方法
Q. Shi, Ning Zhang
At present, security properties for components composition have two major shortcomings. First, they do not properly consider connectivity between components. This leads to the imposition of over strong security requirements on the components. Consequently their functionality and performance may be sacrificed unnecessarily. Secondly, these properties usually demand components and their system to comply with the same or compatible security requirements. This greatly restricts their applicability. To rectify these problems, we aim to present a composable security property that permits different components to meet different security requirements, and appropriately enforces the requirements on the components with regard to their connectivity.
目前,元器件组成的安全性能存在两大不足。首先,它们没有适当地考虑组件之间的连接性。这将导致在组件上强加过于强大的安全性需求。因此,它们的功能和性能可能会不必要地牺牲。其次,这些属性通常要求组件及其系统遵守相同或兼容的安全需求。这极大地限制了它们的适用性。为了纠正这些问题,我们的目标是提供一个可组合的安全属性,它允许不同的组件满足不同的安全需求,并根据组件的连接性适当地在组件上强制执行需求。
{"title":"A general approach to secure components composition","authors":"Q. Shi, Ning Zhang","doi":"10.1109/HASE.1996.618607","DOIUrl":"https://doi.org/10.1109/HASE.1996.618607","url":null,"abstract":"At present, security properties for components composition have two major shortcomings. First, they do not properly consider connectivity between components. This leads to the imposition of over strong security requirements on the components. Consequently their functionality and performance may be sacrificed unnecessarily. Secondly, these properties usually demand components and their system to comply with the same or compatible security requirements. This greatly restricts their applicability. To rectify these problems, we aim to present a composable security property that permits different components to meet different security requirements, and appropriately enforces the requirements on the components with regard to their connectivity.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131269192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PSRR: a scheme for time-bounded fault tolerance in distributed object-based systems PSRR:一种基于分布式对象系统的有时容错方案
K.H. Kim, C. Subbaraman
An extension of the conventional object structuring approach, called the RTO.k object structuring approach, has been established as a unified scheme for object-oriented structuring of both real-time applications and non-real-time applications while enabling the system designer to provide design-time guarantees of timely service capabilities of the objects designed. In another area, the DRB/PSP scheme has been established as a concrete scheme for achieving scalable time-bounded fault tolerance in distributed and parallel computer systems. We present a new scheme called the primary-shadow (PS)-RTO.k replication (PSRR) scheme that integrates the RTO.k object structuring scheme and the basic principle of the DRB/PSP scheme. A partial validation of the PSRR scheme has been performed through incorporation of a simple version of the scheme into a defense application running on a PC LAN. This paper first introduces a new structuring rule that can be imposed on the RTO.k object structuring scheme in order to further simplify the task of the system designer in providing design-time guarantee of timely service capabilities of application systems. Thereafter, the core of the PSRR scheme, the basic operational rules and the basic structuring rules, are discussed.
传统对象结构方法的扩展,称为RTO。K对象结构化方法,已被建立为一种统一的面向对象的实时应用和非实时应用的结构化方案,同时使系统设计者能够为所设计对象的及时服务能力提供设计时的保证。在另一个领域,DRB/PSP方案作为实现分布式和并行计算机系统可扩展的有界容错的具体方案被提出。我们提出了一种称为主影(PS)-RTO的新方案。集成RTO的PSRR (PSRR)复制方案。k对象结构方案和DRB/PSP方案的基本原理。通过将该方案的一个简单版本合并到运行在PC局域网上的防御应用程序中,对PSRR方案进行了部分验证。本文首先介绍了一种新的可用于RTO的结构规则。K对象结构化方案,以进一步简化系统设计者的任务,为应用系统的及时服务能力提供设计时的保证。然后,讨论了PSRR方案的核心,即基本操作规则和基本结构规则。
{"title":"PSRR: a scheme for time-bounded fault tolerance in distributed object-based systems","authors":"K.H. Kim, C. Subbaraman","doi":"10.1109/HASE.1996.618573","DOIUrl":"https://doi.org/10.1109/HASE.1996.618573","url":null,"abstract":"An extension of the conventional object structuring approach, called the RTO.k object structuring approach, has been established as a unified scheme for object-oriented structuring of both real-time applications and non-real-time applications while enabling the system designer to provide design-time guarantees of timely service capabilities of the objects designed. In another area, the DRB/PSP scheme has been established as a concrete scheme for achieving scalable time-bounded fault tolerance in distributed and parallel computer systems. We present a new scheme called the primary-shadow (PS)-RTO.k replication (PSRR) scheme that integrates the RTO.k object structuring scheme and the basic principle of the DRB/PSP scheme. A partial validation of the PSRR scheme has been performed through incorporation of a simple version of the scheme into a defense application running on a PC LAN. This paper first introduces a new structuring rule that can be imposed on the RTO.k object structuring scheme in order to further simplify the task of the system designer in providing design-time guarantee of timely service capabilities of application systems. Thereafter, the core of the PSRR scheme, the basic operational rules and the basic structuring rules, are discussed.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"4 30","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Software on the edge 边缘软件
Victor L. Winter
As our society becomes more technologically complex, computers (and the software that they run) are being used in a potentially alarming number of high consequence safety-critical applications. When these systems fail, the outcome can be devastating. Formal methods provide what, by a growing number of experts, is considered to be the best approach to making the software construction process more reliable. What makes formal methods so attractive, from a reliability standpoint, is that one has the ability to conclude, with mathematical certainty, that a software component is correct. In this context, when we say a software component is correct, we mean it satisfies its formal specification. The paper discusses the problems of software reliability and the use of formal methods.
随着我们的社会在技术上变得越来越复杂,计算机(以及它们运行的软件)正在被用于数量惊人的高后果安全关键应用中。当这些系统失效时,结果可能是毁灭性的。越来越多的专家认为,形式化方法提供了使软件构建过程更加可靠的最佳方法。从可靠性的角度来看,形式化方法之所以如此吸引人,是因为人们有能力以数学上的确定性得出结论,即软件组件是正确的。在这种情况下,当我们说一个软件组件是正确的,我们的意思是它满足它的正式规范。本文讨论了软件可靠性问题和形式化方法的使用。
{"title":"Software on the edge","authors":"Victor L. Winter","doi":"10.1109/HASE.1996.618565","DOIUrl":"https://doi.org/10.1109/HASE.1996.618565","url":null,"abstract":"As our society becomes more technologically complex, computers (and the software that they run) are being used in a potentially alarming number of high consequence safety-critical applications. When these systems fail, the outcome can be devastating. Formal methods provide what, by a growing number of experts, is considered to be the best approach to making the software construction process more reliable. What makes formal methods so attractive, from a reliability standpoint, is that one has the ability to conclude, with mathematical certainty, that a software component is correct. In this context, when we say a software component is correct, we mean it satisfies its formal specification. The paper discusses the problems of software reliability and the use of formal methods.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proving refinement transformations for deriving high-assurance software 为获得高保证软件证明精化转换
V. Winter, J. M. Boyle
The construction of a high-assurance system requires some evidence, ideally a proof, that the system as implemented will behave as required. Direct proofs of implementations do not scale up well as systems become more complex and therefore are of limited value. In recent years, refinement-based approaches have been investigated as a means to manage the complexity inherent in the verification process. In a refinement-based approach, a high-level specification is converted into an implementation through a number of refinement steps. The hope is that the proofs of the individual refinement steps will be easier than a direct proof of the implementation. However, if stepwise refinement is performed manually, the number of steps is severly limited, implying that the size of each step is large. If refinement steps are large, then proofs of their correctness will not be much easier than a direct proof of the implementation. We describe an approach to refinement-based software development that is based on automatic application of refinements, expressed as program transformations. This automation has the desirable effect that the refinement steps can be extremely small and, thus, easy to prove correct. We give an overview of the TAMPR transformation system that we use for automated refinement. We then focus on some aspects of the semantic framework that we have been developing to enable proofs that TAMPR transformations are correctness preserving. With this framework proofs of correctness for transformations can be obtained with the assistance of an automated reasoning system.
高保证系统的构建需要一些证据,理想情况下是一个证明,即系统的实现将按照要求运行。当系统变得更复杂时,实现的直接证明不能很好地扩展,因此价值有限。近年来,人们研究了基于细化的方法作为管理验证过程中固有复杂性的一种手段。在基于细化的方法中,通过许多细化步骤将高级规范转换为实现。希望对单个细化步骤的证明将比对实现的直接证明更容易。但是,如果手动执行逐步细化,则步骤的数量受到严重限制,这意味着每个步骤的大小都很大。如果细化步骤很大,那么证明其正确性并不比直接证明实现容易得多。我们描述了一种基于细化的软件开发方法,它基于细化的自动应用,表示为程序转换。这种自动化具有理想的效果,即细化步骤可以非常小,因此很容易证明是正确的。我们给出了用于自动细化的TAMPR转换系统的概述。然后,我们将重点关注语义框架的一些方面,我们一直在开发这些方面,以便证明TAMPR转换是保持正确性的。有了这个框架,可以在自动推理系统的帮助下获得转换正确性的证明。
{"title":"Proving refinement transformations for deriving high-assurance software","authors":"V. Winter, J. M. Boyle","doi":"10.1109/HASE.1996.618567","DOIUrl":"https://doi.org/10.1109/HASE.1996.618567","url":null,"abstract":"The construction of a high-assurance system requires some evidence, ideally a proof, that the system as implemented will behave as required. Direct proofs of implementations do not scale up well as systems become more complex and therefore are of limited value. In recent years, refinement-based approaches have been investigated as a means to manage the complexity inherent in the verification process. In a refinement-based approach, a high-level specification is converted into an implementation through a number of refinement steps. The hope is that the proofs of the individual refinement steps will be easier than a direct proof of the implementation. However, if stepwise refinement is performed manually, the number of steps is severly limited, implying that the size of each step is large. If refinement steps are large, then proofs of their correctness will not be much easier than a direct proof of the implementation. We describe an approach to refinement-based software development that is based on automatic application of refinements, expressed as program transformations. This automation has the desirable effect that the refinement steps can be extremely small and, thus, easy to prove correct. We give an overview of the TAMPR transformation system that we use for automated refinement. We then focus on some aspects of the semantic framework that we have been developing to enable proofs that TAMPR transformations are correctness preserving. With this framework proofs of correctness for transformations can be obtained with the assistance of an automated reasoning system.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
High assurance engineering: the good, the bad, and the ugly 高保证工程:好的、坏的和丑陋的
I. Yen
Over the past two decades, substantial research efforts have been devoted to the design and development of high assurance systems, including general approaches and specific systems. Researchers in fault tolerant systems have developed effective approaches to handle hardware and software failures and provide high system reliability and availability. Techniques for developing high assurance systems span a wide spectrum, ranging from informal to formal methods, from cost-effective to highly expensive approaches, and from ad-hoc to theoretically sound mechanisms. As an informal classification, the paper categorizes these techniques into the good, the bad, and the ugly.
在过去的二十年中,大量的研究工作致力于设计和开发高保证系统,包括一般方法和特定系统。容错系统的研究人员已经开发出有效的方法来处理硬件和软件故障,并提供高系统可靠性和可用性。开发高保证系统的技术范围很广,从非正式的方法到正式的方法,从具有成本效益的方法到非常昂贵的方法,从特别的机制到理论上合理的机制。作为一种非正式的分类,本文将这些技术分为好、坏和丑。
{"title":"High assurance engineering: the good, the bad, and the ugly","authors":"I. Yen","doi":"10.1109/HASE.1996.618560","DOIUrl":"https://doi.org/10.1109/HASE.1996.618560","url":null,"abstract":"Over the past two decades, substantial research efforts have been devoted to the design and development of high assurance systems, including general approaches and specific systems. Researchers in fault tolerant systems have developed effective approaches to handle hardware and software failures and provide high system reliability and availability. Techniques for developing high assurance systems span a wide spectrum, ranging from informal to formal methods, from cost-effective to highly expensive approaches, and from ad-hoc to theoretically sound mechanisms. As an informal classification, the paper categorizes these techniques into the good, the bad, and the ugly.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A technique for validating Booch object-oriented designs from extensions to the Descartes specification language 用于验证从扩展到笛卡儿规范语言的Booch面向对象设计的技术
Ramkumar V. Pichai, J. E. Urban
Software validation is the process of checking whether the software performs as required. Validation assumes much importance in the case of high assurance (real time, reliable, safety critical, and secure) systems, us even a slight deviation from the desired behavior is unacceptable. Descartes is an executable specification language. Specifications in Descartes are validated through rapid prototyping. This paper explains a traceability approach for validating Booch object oriented designs against validated object oriented Descartes specifications. The CASE tool developed in support of the technique is also explained in brief.
软件验证是检查软件是否按要求运行的过程。在高保证(实时、可靠、安全关键和安全)系统的情况下,验证非常重要,因为即使是与期望行为的轻微偏差也是不可接受的。笛卡尔是一种可执行的规范语言。在笛卡儿规范是通过快速原型验证。本文解释了一种验证Booch面向对象设计的可追溯性方法,该方法与经过验证的面向对象笛卡尔规范相对照。本文还简要说明了为支持该技术而开发的CASE工具。
{"title":"A technique for validating Booch object-oriented designs from extensions to the Descartes specification language","authors":"Ramkumar V. Pichai, J. E. Urban","doi":"10.1109/HASE.1996.618559","DOIUrl":"https://doi.org/10.1109/HASE.1996.618559","url":null,"abstract":"Software validation is the process of checking whether the software performs as required. Validation assumes much importance in the case of high assurance (real time, reliable, safety critical, and secure) systems, us even a slight deviation from the desired behavior is unacceptable. Descartes is an executable specification language. Specifications in Descartes are validated through rapid prototyping. This paper explains a traceability approach for validating Booch object oriented designs against validated object oriented Descartes specifications. The CASE tool developed in support of the technique is also explained in brief.","PeriodicalId":129829,"journal":{"name":"Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131510126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1