首页 > 最新文献

2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Mining A change history to quickly identify bug locations : A case study of the Eclipse project 挖掘变更历史以快速识别bug位置:Eclipse项目的一个案例研究
C. Tantithamthavorn, Rattamont Teekavanich, Akinori Ihara, Ken-ichi Matsumoto
In this study, we proposed an approach to mine a change history to improve the bug localization performance. The key idea is that a recently fixed file may be fixed in the near future. We used a combination of textual feature and mining the change history to recommend source code files that are likely to be fixed for a given bug report. First, we adopted the Vector Space Model (VSM) to find relevant source code files that are textually similar to the bug report. Second, we analyzed the change history to identify previously fixed files. We then estimated the fault proneness of these files. Finally, we combined the two scores, from textual similarity and fault proneness, for every source code file. We then recommend developers examine source code files with higher scores. We evaluated our approach based on 1,212 bug reports from the Eclipse Platform and Eclipse JDT. The experimental results show that our proposed approach can improve the bug localization performance and effectively identify buggy files.
在本研究中,我们提出了一种挖掘变更历史的方法来提高bug定位性能。关键思想是最近修复的文件可能在不久的将来被修复。我们结合使用文本特性和挖掘变更历史来推荐可能针对给定错误报告进行修复的源代码文件。首先,我们采用向量空间模型(VSM)找到与bug报告文本相似的相关源代码文件。其次,我们分析了变更历史以确定以前修复的文件。然后我们估计了这些文件的错误倾向。最后,我们将每个源代码文件的文本相似度和错误倾向这两个分数结合起来。然后,我们建议开发人员以较高的分数检查源代码文件。我们根据来自Eclipse平台和Eclipse JDT的1212个bug报告评估了我们的方法。实验结果表明,该方法可以提高bug定位性能,有效地识别出bug文件。
{"title":"Mining A change history to quickly identify bug locations : A case study of the Eclipse project","authors":"C. Tantithamthavorn, Rattamont Teekavanich, Akinori Ihara, Ken-ichi Matsumoto","doi":"10.1109/ISSREW.2013.6688888","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688888","url":null,"abstract":"In this study, we proposed an approach to mine a change history to improve the bug localization performance. The key idea is that a recently fixed file may be fixed in the near future. We used a combination of textual feature and mining the change history to recommend source code files that are likely to be fixed for a given bug report. First, we adopted the Vector Space Model (VSM) to find relevant source code files that are textually similar to the bug report. Second, we analyzed the change history to identify previously fixed files. We then estimated the fault proneness of these files. Finally, we combined the two scores, from textual similarity and fault proneness, for every source code file. We then recommend developers examine source code files with higher scores. We evaluated our approach based on 1,212 bug reports from the Eclipse Platform and Eclipse JDT. The experimental results show that our proposed approach can improve the bug localization performance and effectively identify buggy files.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Medical device software risk assessment requires cross functional personnel 医疗器械软件风险评估需要跨职能人员
Alfred Granger, Paul R. Garrett, Gary Dalmadge
Presents a collection of slides exploring the concept of medical risk in relation to software development and testing.
介绍一系列探索与软件开发和测试相关的医疗风险概念的幻灯片。
{"title":"Medical device software risk assessment requires cross functional personnel","authors":"Alfred Granger, Paul R. Garrett, Gary Dalmadge","doi":"10.1109/ISSREW.2013.6688899","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688899","url":null,"abstract":"Presents a collection of slides exploring the concept of medical risk in relation to software development and testing.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using software reliability models for security assessment — Verification of assumptions 使用软件可靠性模型进行安全评估。假设的验证
Da Young Lee, M. Vouk, L. Williams
Can software reliability models be used to assess software security? One of the issues is that security problems are relatively rare under “normal” operational profiles, while “classical” reliability models may not be suitable for use in attack conditions. We investigated a range of Fedora open source software security problems to see if some of the basic assumptions behind software reliability growth models hold for discovery of security problems in non-attack situations. We find that in some cases, under “normal” operational use, security problem detection process may be described as a Poisson process. In those cases, we can use appropriate classical software reliability growth models to assess “security reliability” of that software in non-attack situations.
软件可靠性模型可以用来评估软件安全性吗?其中一个问题是,在“正常”操作配置文件下,安全性问题相对较少,而“经典”可靠性模型可能不适合在攻击条件下使用。我们研究了一系列Fedora开源软件安全问题,以了解软件可靠性增长模型背后的一些基本假设是否适用于在非攻击情况下发现安全问题。我们发现,在某些情况下,在“正常”操作使用下,安全问题检测过程可以描述为泊松过程。在这些情况下,我们可以使用适当的经典软件可靠性增长模型来评估该软件在非攻击情况下的“安全可靠性”。
{"title":"Using software reliability models for security assessment — Verification of assumptions","authors":"Da Young Lee, M. Vouk, L. Williams","doi":"10.1109/ISSREW.2013.6688858","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688858","url":null,"abstract":"Can software reliability models be used to assess software security? One of the issues is that security problems are relatively rare under “normal” operational profiles, while “classical” reliability models may not be suitable for use in attack conditions. We investigated a range of Fedora open source software security problems to see if some of the basic assumptions behind software reliability growth models hold for discovery of security problems in non-attack situations. We find that in some cases, under “normal” operational use, security problem detection process may be described as a Poisson process. In those cases, we can use appropriate classical software reliability growth models to assess “security reliability” of that software in non-attack situations.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploring possibilities to analyse microblogs for dependability information in variability-intensive open source software systems 探索在可变性密集的开源软件系统中分析微博的可靠性信息的可能性
M. Galster, Daniel Tofan
Many open source software systems are variability-intensive because they are frequently adapted to different customer needs or deployment environments. Variability in these systems not only occurs in functionality, but also in quality attributes (e.g., security, reliability, dependability). Furthermore, variability in functionality and variability in quality attributes affect each other. Recently, open source communities have adopted microblogging to document and share software engineering knowledge. Microblogging dissolves boundaries between developers and other stakeholders (e.g., end users). This facilitates the involvement of many different non-technical stakeholders in the software development process. In this paper, we investigate the feasibility and suitability of utilizing microblogs to identify and analyze dependability information about open source software systems. We use the example of the currently most popular microblogging infrastructure (Twitter) and a widely used open source content management system (Drupal). Our results indicate that even though open source communities frequently share information on Twitter, challenges exist for extracting and analyzing dependability information. Furthermore, a better understanding is needed to describe the relation between issues reported by user communities in microblogs, and issues and actions documented by developer communities in change logs and release information.
许多开源软件系统都是可变密集型的,因为它们经常适应不同的客户需求或部署环境。这些系统中的可变性不仅发生在功能上,也发生在质量属性上(例如,安全性、可靠性、可靠性)。此外,功能的可变性和质量属性的可变性相互影响。最近,开源社区采用了微博客来记录和共享软件工程知识。微博消除了开发人员和其他利益相关者(例如,终端用户)之间的界限。这促进了软件开发过程中许多不同的非技术涉众的参与。本文探讨了利用微博识别和分析开源软件系统可靠性信息的可行性和适宜性。我们以当前最流行的微博客基础设施(Twitter)和广泛使用的开源内容管理系统(Drupal)为例。我们的研究结果表明,尽管开源社区经常在Twitter上共享信息,但在提取和分析可靠性信息方面仍然存在挑战。此外,需要更好地理解用户社区在微博中报告的问题与开发人员社区在更改日志和发布信息中记录的问题和行动之间的关系。
{"title":"Exploring possibilities to analyse microblogs for dependability information in variability-intensive open source software systems","authors":"M. Galster, Daniel Tofan","doi":"10.1109/ISSREW.2013.6688914","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688914","url":null,"abstract":"Many open source software systems are variability-intensive because they are frequently adapted to different customer needs or deployment environments. Variability in these systems not only occurs in functionality, but also in quality attributes (e.g., security, reliability, dependability). Furthermore, variability in functionality and variability in quality attributes affect each other. Recently, open source communities have adopted microblogging to document and share software engineering knowledge. Microblogging dissolves boundaries between developers and other stakeholders (e.g., end users). This facilitates the involvement of many different non-technical stakeholders in the software development process. In this paper, we investigate the feasibility and suitability of utilizing microblogs to identify and analyze dependability information about open source software systems. We use the example of the currently most popular microblogging infrastructure (Twitter) and a widely used open source content management system (Drupal). Our results indicate that even though open source communities frequently share information on Twitter, challenges exist for extracting and analyzing dependability information. Furthermore, a better understanding is needed to describe the relation between issues reported by user communities in microblogs, and issues and actions documented by developer communities in change logs and release information.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reliability feedback through system log analysis 通过系统日志分析反馈可靠性
K. Vinod, Pandit Pattabhirama, M. Ramachandra
The healthcare industry has taken a significant pie in the information technology where a great progress is being shown in analyzing the research and development data collected over the years. Yet, most of the potential for value creation is still unclaimed. [1] In a typical healthcare system, the actual usage of the system can be determined when one transitions from the monitoring or a limited release phase of the project to the volume deployment mode. An early, if not a continuous feedback, can be ensured when the systems are usually beta tested at the selected sites. This is where we bring in the system log file analysis to play a major role in determining the reliability of the deployed system to receive an incessant and established feedback.
医疗保健行业在信息技术领域占有相当大的份额,在分析多年来收集的研究和开发数据方面取得了巨大进展。然而,大部分价值创造的潜力仍未被发掘。[1]在典型的医疗保健系统中,当从项目的监控或有限发布阶段过渡到批量部署模式时,可以确定系统的实际使用情况。当系统通常在选定的站点进行beta测试时,可以确保早期的(如果不是持续的)反馈。这就是我们引入系统日志文件分析的地方,它在确定部署系统的可靠性以接收不间断的和已建立的反馈方面发挥主要作用。
{"title":"Reliability feedback through system log analysis","authors":"K. Vinod, Pandit Pattabhirama, M. Ramachandra","doi":"10.1109/ISSREW.2013.6688877","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688877","url":null,"abstract":"The healthcare industry has taken a significant pie in the information technology where a great progress is being shown in analyzing the research and development data collected over the years. Yet, most of the potential for value creation is still unclaimed. [1] In a typical healthcare system, the actual usage of the system can be determined when one transitions from the monitoring or a limited release phase of the project to the volume deployment mode. An early, if not a continuous feedback, can be ensured when the systems are usually beta tested at the selected sites. This is where we bring in the system log file analysis to play a major role in determining the reliability of the deployed system to receive an incessant and established feedback.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characteristic analysis of quantitative definition of resiliency measure 弹性测度定量定义的特征分析
C. Luo, H. Okamura, T. Dohi
Resiliency (resilience) is one of the important criteria for evaluating the sturdiness of systems. The resiliency is generally defined as the ability of resistance from disturbance that is caused by sudden changes of system configuration. However, there is no formal quantitative definition of system resiliency. In this paper, we propose the quantification of system resiliency by using continuous time Markov chains (CTMCs). According to probabilistic models, we formulate the quantification resiliency for performance indices of the system by two methods. Also, we discuss the applicability of our quantification of resiliency and compare the effectiveness of two definitions through numerical examples.
弹性(resilience)是评价系统稳健性的重要标准之一。弹性通常被定义为抵抗系统结构突然变化所引起的干扰的能力。然而,系统弹性没有正式的定量定义。本文提出了用连续时间马尔可夫链(ctmc)量化系统弹性的方法。根据概率模型,采用两种方法建立了系统性能指标的量化弹性。此外,我们讨论了弹性量化的适用性,并通过数值算例比较了两种定义的有效性。
{"title":"Characteristic analysis of quantitative definition of resiliency measure","authors":"C. Luo, H. Okamura, T. Dohi","doi":"10.1109/ISSREW.2013.6688852","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688852","url":null,"abstract":"Resiliency (resilience) is one of the important criteria for evaluating the sturdiness of systems. The resiliency is generally defined as the ability of resistance from disturbance that is caused by sudden changes of system configuration. However, there is no formal quantitative definition of system resiliency. In this paper, we propose the quantification of system resiliency by using continuous time Markov chains (CTMCs). According to probabilistic models, we formulate the quantification resiliency for performance indices of the system by two methods. Also, we discuss the applicability of our quantification of resiliency and compare the effectiveness of two definitions through numerical examples.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114454658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Radio Diagnostic tool: IDoctor 无线电诊断工具:iddoctor
Wei Hoo Chong
Reproducing issues to verify if the issues, especially reset issues, reported by customer are valid issues are tedious and time consuming. The rationale is not all issues can be reproduced and it is not easy to reproduce as some issues may be caused by hardware failure, environmental factor such as air pressure and temperature, and etc. Although the existing reset capture implemented in the radio is used to capturing this kind of intermittent defects, these dependencies are not recorded into the radio when issue happened. The reset capture is able to capture the last state of the radio before reset happens. So, the information such as, how many calls had been made before the radio hangs and resets? What is the battery level before resets? It remains unknown. This information is crucial for the issue as we need to know whether the issue happens after the first call made or after many calls made; during battery level is low or full. Hence, a Diagnostic tool is introduced in order to track radios' condition and to serve as an additional information for developer in bug fixing. iDoctor aims to reduce time in reproducing issues and helps developers to resolve issues faster if the comprehensive data logging is performed. At the same time, the health of the radio can be monitored as well. As a result, this will increase customer's satisfaction and their confidence level to the company that may directly impact to the company's market share.
再现问题以验证客户报告的问题(特别是重置问题)是否是有效问题是乏味且耗时的。理由是不是所有的问题都可以重现,而且不容易重现,因为有些问题可能是由硬件故障、环境因素(如气压和温度)等引起的。尽管在无线电中实现的现有重置捕获用于捕获这种间歇性缺陷,但是当问题发生时,这些依赖关系并没有记录到无线电中。复位捕获能够在复位发生之前捕获无线电的最后状态。因此,诸如在无线电挂起和重置之前已经打了多少个电话之类的信息?重置前电池电量是多少?它仍然是未知的。这些信息对问题至关重要,因为我们需要知道问题是在第一次打电话之后发生的,还是在多次打电话之后发生的;电池电量低或满时。因此,引入了一个诊断工具来跟踪无线电的状况,并为开发人员修复错误提供额外的信息。iDoctor旨在减少再现问题的时间,并帮助开发人员在执行全面的数据记录时更快地解决问题。同时,也可以监测无线电的健康状况。因此,这将提高客户的满意度和他们对公司的信心水平,这可能直接影响到公司的市场份额。
{"title":"Radio Diagnostic tool: IDoctor","authors":"Wei Hoo Chong","doi":"10.1109/ISSREW.2013.6688864","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688864","url":null,"abstract":"Reproducing issues to verify if the issues, especially reset issues, reported by customer are valid issues are tedious and time consuming. The rationale is not all issues can be reproduced and it is not easy to reproduce as some issues may be caused by hardware failure, environmental factor such as air pressure and temperature, and etc. Although the existing reset capture implemented in the radio is used to capturing this kind of intermittent defects, these dependencies are not recorded into the radio when issue happened. The reset capture is able to capture the last state of the radio before reset happens. So, the information such as, how many calls had been made before the radio hangs and resets? What is the battery level before resets? It remains unknown. This information is crucial for the issue as we need to know whether the issue happens after the first call made or after many calls made; during battery level is low or full. Hence, a Diagnostic tool is introduced in order to track radios' condition and to serve as an additional information for developer in bug fixing. iDoctor aims to reduce time in reproducing issues and helps developers to resolve issues faster if the comprehensive data logging is performed. At the same time, the health of the radio can be monitored as well. As a result, this will increase customer's satisfaction and their confidence level to the company that may directly impact to the company's market share.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong and weak contract formalism for third-party component reuse 用于第三方组件重用的强契约和弱契约形式
Irfan Šljivo, B. Gallina, Jan Carlson, H. Hansson
Our aim is to contribute to bridging the gap between the justified need from industry to reuse third-party components and skepticism of the safety community in integrating and reusing components developed without real knowledge of the system context. We have developed a notion of safety contract that will help to capture safety-related information for supporting the reuse of software components in and across safety-critical systems. In this paper we present our extension of the contract formalism for specifying strong and weak assumption/guarantee contracts for out-of-context reusable components. We elaborate on notion of satisfaction, including refinement, dominance and composition check. To show the usage and the expressiveness of our extended formalism, we specify strong and weak safety contracts related to a wheel braking system.
我们的目标是弥合行业对重用第三方组件的合理需求与安全社区对集成和重用在没有真正了解系统环境的情况下开发的组件的怀疑之间的差距。我们已经开发了一个安全契约的概念,它将帮助捕获与安全相关的信息,以支持在安全关键系统内和跨安全关键系统重用软件组件。在本文中,我们提出了契约形式的扩展,用于指定上下文外可重用组件的强假设/保证契约和弱假设/保证契约。我们详细阐述了满意度的概念,包括细化、优势和组成检查。为了展示我们扩展形式的用法和表达性,我们指定了与车轮制动系统相关的强安全契约和弱安全契约。
{"title":"Strong and weak contract formalism for third-party component reuse","authors":"Irfan Šljivo, B. Gallina, Jan Carlson, H. Hansson","doi":"10.1109/ISSREW.2013.6688921","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688921","url":null,"abstract":"Our aim is to contribute to bridging the gap between the justified need from industry to reuse third-party components and skepticism of the safety community in integrating and reusing components developed without real knowledge of the system context. We have developed a notion of safety contract that will help to capture safety-related information for supporting the reuse of software components in and across safety-critical systems. In this paper we present our extension of the contract formalism for specifying strong and weak assumption/guarantee contracts for out-of-context reusable components. We elaborate on notion of satisfaction, including refinement, dominance and composition check. To show the usage and the expressiveness of our extended formalism, we specify strong and weak safety contracts related to a wheel braking system.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127229388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A new model to capture security threat patterns by complying with standards and lesson learned — Archiving dependability for security assurance cases 通过遵循标准和经验教训来捕获安全威胁模式的新模型——存档安全保证案例的可靠性
V. Patu, Shuichiro Yamamoto
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots of security models, tools and methods that are being created and used within institutes and organizations in order to mitigate risk, threats and vulnerabilities of systems. However, the publicized information so far still has holes and limitations in postulating successful results. This paper presents our new model to archive the dependability goal of a security assurance case.
当今的软件系统在安全问题上面临着新的、复杂的挑战。为了降低系统的风险、威胁和漏洞,机构和组织正在创建和使用许多安全模型、工具和方法。然而,目前公开的信息在假设成功结果方面仍然存在漏洞和局限性。本文提出了一种新的模型来归档安全保障案例的可靠性目标。
{"title":"A new model to capture security threat patterns by complying with standards and lesson learned — Archiving dependability for security assurance cases","authors":"V. Patu, Shuichiro Yamamoto","doi":"10.1109/ISSREW.2013.6688855","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688855","url":null,"abstract":"Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots of security models, tools and methods that are being created and used within institutes and organizations in order to mitigate risk, threats and vulnerabilities of systems. However, the publicized information so far still has holes and limitations in postulating successful results. This paper presents our new model to archive the dependability goal of a security assurance case.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123642639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Requirements engineering in rail transit production: An experience report 轨道交通生产需求工程:经验报告
Fernanda Buonanno, Domenico Di Leo, Paolo di Paolo, R. Pietrantuono, S. Russo
Software is an increasing part of train control systems, calling for the integration of sound software design techniques into consolidated industrial systems' engineering processes. Although requirements engineering is a traditional software engineering area, its relevance for critical embedded systems is underestimated. We present the experience of a public-private collaboration between University of Naples and Ansaldo Breda, a leading company in the field of rail transit systems. The experience is focused on requirements engineering as a driver to improve the development process in order to better support, in the long term, software quality and safety assurance activities, at the same time with a proper cost/quality trade-off (higher quality costs are compensated through reuse over a product line).
软件是列车控制系统中越来越重要的组成部分,这就要求将良好的软件设计技术集成到统一的工业系统工程过程中。尽管需求工程是传统的软件工程领域,但它与关键嵌入式系统的相关性被低估了。我们介绍了那不勒斯大学与轨道交通系统领域的领先公司Ansaldo Breda之间的公私合作经验。经验集中在需求工程上,将其作为改进开发过程的驱动程序,以便在长期内更好地支持软件质量和安全保证活动,同时进行适当的成本/质量权衡(通过在产品线上的重用来补偿更高的质量成本)。
{"title":"Requirements engineering in rail transit production: An experience report","authors":"Fernanda Buonanno, Domenico Di Leo, Paolo di Paolo, R. Pietrantuono, S. Russo","doi":"10.1109/ISSREW.2013.6688919","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688919","url":null,"abstract":"Software is an increasing part of train control systems, calling for the integration of sound software design techniques into consolidated industrial systems' engineering processes. Although requirements engineering is a traditional software engineering area, its relevance for critical embedded systems is underestimated. We present the experience of a public-private collaboration between University of Naples and Ansaldo Breda, a leading company in the field of rail transit systems. The experience is focused on requirements engineering as a driver to improve the development process in order to better support, in the long term, software quality and safety assurance activities, at the same time with a proper cost/quality trade-off (higher quality costs are compensated through reuse over a product line).","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1