首页 > 最新文献

29th Annual International Computer Software and Applications Conference (COMPSAC'05)最新文献

英文 中文
Self-testability in unit testing 单元测试中的自测试性
Sami Beydeda
An often-proposed approach to decrease costs of software development projects is to reuse existing software units. Reusing software units has indeed the potential to decrease costs, but this decrease of costs has to be put in relation to the risks inherent in third-party software. In particular, third-party software units can have a high inherent complexity complicating testing, even worse, source code and other information required for testing might not be available at all. In such cases, self-testability, if the software unit has been augmented appropriately, can be a method for ensuring that the software unit reused fits into the system to be developed with respect to its quality.
减少软件开发项目成本的一个经常被提议的方法是重用现有的软件单元。重用软件单元确实具有降低成本的潜力,但是这种成本的降低必须与第三方软件中固有的风险联系起来。特别是,第三方软件单元可能具有较高的固有复杂性,使测试复杂化,更糟糕的是,源代码和测试所需的其他信息可能根本无法获得。在这种情况下,如果软件单元得到了适当的扩充,那么自测试性就可以成为一种方法,以确保重用的软件单元符合要开发的系统的质量。
{"title":"Self-testability in unit testing","authors":"Sami Beydeda","doi":"10.1109/COMPSAC.2005.139","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.139","url":null,"abstract":"An often-proposed approach to decrease costs of software development projects is to reuse existing software units. Reusing software units has indeed the potential to decrease costs, but this decrease of costs has to be put in relation to the risks inherent in third-party software. In particular, third-party software units can have a high inherent complexity complicating testing, even worse, source code and other information required for testing might not be available at all. In such cases, self-testability, if the software unit has been augmented appropriately, can be a method for ensuring that the software unit reused fits into the system to be developed with respect to its quality.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical validation of Website timeliness measures 网站时效性测度的实证验证
Yanlong Zhang, Hong Zhu, S. Greenwood
Information timeliness is crucial for media-based Websites. AI though a couple of timeliness design strategies have been developed, timeliness measurement is still in its infancy. Based on our previous research, this paper presents three timeliness measures and reports the empirical validation of them in a case study conducted during the recent Olympic Games.
对于基于媒体的网站来说,信息的时效性至关重要。人工智能虽然已经开发了一些时效性设计策略,但时效性测量仍处于起步阶段。本文在前人研究的基础上,提出了三种时效性度量方法,并以最近的奥运会为例进行了实证验证。
{"title":"Empirical validation of Website timeliness measures","authors":"Yanlong Zhang, Hong Zhu, S. Greenwood","doi":"10.1109/COMPSAC.2005.72","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.72","url":null,"abstract":"Information timeliness is crucial for media-based Websites. AI though a couple of timeliness design strategies have been developed, timeliness measurement is still in its infancy. Based on our previous research, this paper presents three timeliness measures and reports the empirical validation of them in a case study conducted during the recent Olympic Games.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124648912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Testing the semantics of W3C XML schema 测试W3C XML模式的语义
J. Li, James Miller
The XML schema language is becoming the preferred means of defining and validating highly structured XML instance documents. We have extended the conventional mutation method to be applicable for W3C XML schemas. In this paper a technique for using mutation analysis to test the semantic correctness of W3C XML schemas is presented. We introduce a mutation analysis model and a set of W3C XML schema (XSD) mutation operators that can be used to detect faults involving name-spaces, user-defined types, and inheritance. Preliminary evaluation of our technique shows that it is effectiveness to test the semantics of W3C XML schema documents.
XML模式语言正在成为定义和验证高度结构化的XML实例文档的首选方法。我们扩展了传统的突变方法,使其适用于W3C XML模式。本文提出了一种利用突变分析来测试W3C XML模式语义正确性的技术。我们引入了一个突变分析模型和一组W3C XML模式(XSD)突变操作符,它们可用于检测涉及名称空间、用户定义类型和继承的错误。对我们技术的初步评估表明,测试W3C XML模式文档的语义是有效的。
{"title":"Testing the semantics of W3C XML schema","authors":"J. Li, James Miller","doi":"10.1109/COMPSAC.2005.151","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.151","url":null,"abstract":"The XML schema language is becoming the preferred means of defining and validating highly structured XML instance documents. We have extended the conventional mutation method to be applicable for W3C XML schemas. In this paper a technique for using mutation analysis to test the semantic correctness of W3C XML schemas is presented. We introduce a mutation analysis model and a set of W3C XML schema (XSD) mutation operators that can be used to detect faults involving name-spaces, user-defined types, and inheritance. Preliminary evaluation of our technique shows that it is effectiveness to test the semantics of W3C XML schema documents.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A probabilistic approach to the anxious home for activity monitoring 焦虑家庭活动监测的概率方法
G. West, S. Greenhill, S. Venkatesh
This paper describes an approach to representing normal activities in a smart house based on the concept of anxiety. Anxiety is computed as a function of time and is kept low by interactions of an occupant with the various devices in a house. Abnormality is indicated by a lack of activity or the wrong activity which will cause anxiety to rise ultimately raising an alarm, querying the occupant and/or alerting a carer in real-time. Anxiety is formulated using probabilistic models that describe how people interact with devices in combinations. These models can be learnt interactively as the smart house acts pessimistically enquiring of the occupant if what they are doing is normal. Results are presented for a number of kitchen scenarios and for different formulations of anxiety.
本文描述了一种基于焦虑概念来表示智能住宅中正常活动的方法。焦虑被计算为时间的函数,并通过居住者与房子里各种设备的互动来保持低水平。异常是指缺乏活动或错误的活动,这将导致焦虑上升,最终发出警报,询问居住者和/或实时提醒护理人员。焦虑是用概率模型来表述的,该模型描述了人们如何与组合设备互动。当智能住宅悲观地询问居住者他们所做的是否正常时,这些模型可以交互式地学习。结果提出了一些厨房场景和不同的配方的焦虑。
{"title":"A probabilistic approach to the anxious home for activity monitoring","authors":"G. West, S. Greenhill, S. Venkatesh","doi":"10.1109/COMPSAC.2005.29","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.29","url":null,"abstract":"This paper describes an approach to representing normal activities in a smart house based on the concept of anxiety. Anxiety is computed as a function of time and is kept low by interactions of an occupant with the various devices in a house. Abnormality is indicated by a lack of activity or the wrong activity which will cause anxiety to rise ultimately raising an alarm, querying the occupant and/or alerting a carer in real-time. Anxiety is formulated using probabilistic models that describe how people interact with devices in combinations. These models can be learnt interactively as the smart house acts pessimistically enquiring of the occupant if what they are doing is normal. Results are presented for a number of kitchen scenarios and for different formulations of anxiety.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130502793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Considerations on a new software architecture for distributed environments using autonomous semantic agents 使用自主语义代理的分布式环境新软件体系结构的考虑
Atilla Elçi, Behnam Rahnama
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then be realized as a semantic Web service, a whole TMS is easily implemented through a collection of semantic Web services agents arranged according to the topology of the traffic network. It would suffice to develop a generic ASA Web service class, instantiate individual ASAs from it in numbers as required one per junction, and supply specific intersection data in semantically-enriched representation to each. Should advanced information support and control services be required, one of the ASAs may be configured slightly differently in that it acts as the operational overseer and repository for aggregated data and ASA class code. Once created, this facilitator ASA knows the topology of the whole traffic network, identifies each intersection (and its associated ASA), can interrogate and instruct individual ASAs, aspects of ASA design, operation, and application development using ASAs are taken into consideration. Simulations show high performance and the benefits of load distribution using ASAs.
通过使用自治语义代理(asa),可以更容易、更快、更安全地实现分布式处理环境,例如流量管理网络系统(TMS)。由于ASA可以作为语义Web服务实现,因此可以通过根据流量网络拓扑排列的语义Web服务代理集合轻松实现整个TMS。开发一个通用的ASA Web服务类,根据需要从其中实例化多个ASA,并以语义丰富的表示形式向每个ASA提供特定的交集数据,这就足够了。如果需要先进的信息支持和控制服务,其中一个ASA的配置可能略有不同,因为它充当业务监督员和汇总数据和ASA类代码的存储库。一旦创建,这个辅助ASA知道整个交通网络的拓扑结构,识别每个十字路口(及其相关的ASA),可以询问和指导单个ASA, ASA设计、操作和使用ASA开发应用程序的各个方面都被考虑在内。仿真显示了使用ASAs的高性能和负载分配的好处。
{"title":"Considerations on a new software architecture for distributed environments using autonomous semantic agents","authors":"Atilla Elçi, Behnam Rahnama","doi":"10.1109/COMPSAC.2005.63","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.63","url":null,"abstract":"Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then be realized as a semantic Web service, a whole TMS is easily implemented through a collection of semantic Web services agents arranged according to the topology of the traffic network. It would suffice to develop a generic ASA Web service class, instantiate individual ASAs from it in numbers as required one per junction, and supply specific intersection data in semantically-enriched representation to each. Should advanced information support and control services be required, one of the ASAs may be configured slightly differently in that it acts as the operational overseer and repository for aggregated data and ASA class code. Once created, this facilitator ASA knows the topology of the whole traffic network, identifies each intersection (and its associated ASA), can interrogate and instruct individual ASAs, aspects of ASA design, operation, and application development using ASAs are taken into consideration. Simulations show high performance and the benefits of load distribution using ASAs.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A requirement engineering approach for designing XML-view driven, XML document warehouses 用于设计XML视图驱动的XML文档仓库的需求工程方法
Vicky Nassis, R. Rajugan, T. Dillon, J. Rahayu
The extensible markup language (XML) has emerged as the dominant standard in describing and exchanging data among heterogeneous data sources. The increasing presence of large volumes of data appearing in enterprise settings creates the need to investigate XML document warehouses (XDW) as a means of handling and analysing XML data for business intelligence. In our previous work, we proposed a conceptual modelling approach for the design and development of XDWs, with emphasis on capturing data warehouse requirements early in the design stage. To address this issue, in this paper, we explore a requirement engineering (RE) approach, namely the goal-oriented approach. We adopt and extend the notion of this approach and introduce the XDW requirement model. This focuses on deriving dimensions, as opposed to associating organizational objectives to the system functions, which is carried out by the traditional requirement engineering process.
可扩展标记语言(XML)已经成为在异构数据源之间描述和交换数据的主要标准。随着企业设置中出现的大量数据的增加,需要研究XML文档仓库(XDW)作为处理和分析XML数据以实现商业智能的一种手段。在我们之前的工作中,我们提出了一种用于设计和开发xdw的概念性建模方法,强调在设计阶段的早期捕获数据仓库需求。为了解决这个问题,在本文中,我们探索了需求工程(RE)方法,即面向目标的方法。我们采用并扩展了这种方法的概念,并引入了XDW需求模型。这侧重于派生维度,而不是将组织目标与系统功能联系起来,后者是由传统的需求工程过程执行的。
{"title":"A requirement engineering approach for designing XML-view driven, XML document warehouses","authors":"Vicky Nassis, R. Rajugan, T. Dillon, J. Rahayu","doi":"10.1109/COMPSAC.2005.32","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.32","url":null,"abstract":"The extensible markup language (XML) has emerged as the dominant standard in describing and exchanging data among heterogeneous data sources. The increasing presence of large volumes of data appearing in enterprise settings creates the need to investigate XML document warehouses (XDW) as a means of handling and analysing XML data for business intelligence. In our previous work, we proposed a conceptual modelling approach for the design and development of XDWs, with emphasis on capturing data warehouse requirements early in the design stage. To address this issue, in this paper, we explore a requirement engineering (RE) approach, namely the goal-oriented approach. We adopt and extend the notion of this approach and introduce the XDW requirement model. This focuses on deriving dimensions, as opposed to associating organizational objectives to the system functions, which is carried out by the traditional requirement engineering process.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detecting intrusions specified in a software specification language 检测以软件规范语言指定的入侵
M. Raihan, Mohammad Zulkernine
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion detection systems (IDS) are those kinds of monitoring tools that have gained a considerable amount of popularity, A number of specification-based IDSs have been proposed, where security requirements or attack scenarios are specified using some languages. Currently, attack specification languages are being deployed for describing security requirements. Use of two different languages for software specification and security specification invites a number of unwanted but complicated issues, such as duplication of requirements specification effort as well as the existence of redundant and conflicting requirements. In this paper, we present an intrusion detection technique that uses a formal software specification language called abstract state machine language (AsmL) for the specification of security requirements. We present a framework, and develop the algorithm for the IDS that interprets the AsmL attack scenario specifications in order to detect intrusions. Moreover, we discuss case studies where the presented intrusion detection system is used to detect attacks.
为了保护软件免受恶意活动的侵害,组织需要监控安全漏洞。入侵检测系统(IDS)是一种非常受欢迎的监控工具,已经提出了许多基于规范的入侵检测系统,其中使用某些语言指定了安全需求或攻击场景。目前,正在部署攻击规范语言来描述安全需求。在软件规范和安全规范中使用两种不同的语言会引起许多不必要的但复杂的问题,例如需求规范工作的重复以及冗余和冲突需求的存在。在本文中,我们提出了一种入侵检测技术,该技术使用一种称为抽象状态机语言(AsmL)的正式软件规范语言来规范安全需求。我们提出了一个框架,并开发了IDS的算法,该算法解释了AsmL攻击场景规范,以检测入侵。此外,我们还讨论了使用所提出的入侵检测系统检测攻击的案例研究。
{"title":"Detecting intrusions specified in a software specification language","authors":"M. Raihan, Mohammad Zulkernine","doi":"10.1109/COMPSAC.2005.69","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.69","url":null,"abstract":"To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion detection systems (IDS) are those kinds of monitoring tools that have gained a considerable amount of popularity, A number of specification-based IDSs have been proposed, where security requirements or attack scenarios are specified using some languages. Currently, attack specification languages are being deployed for describing security requirements. Use of two different languages for software specification and security specification invites a number of unwanted but complicated issues, such as duplication of requirements specification effort as well as the existence of redundant and conflicting requirements. In this paper, we present an intrusion detection technique that uses a formal software specification language called abstract state machine language (AsmL) for the specification of security requirements. We present a framework, and develop the algorithm for the IDS that interprets the AsmL attack scenario specifications in order to detect intrusions. Moreover, we discuss case studies where the presented intrusion detection system is used to detect attacks.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131750783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
FMECA control for software development 软件开发的FMECA控制
J. Graham
This paper presents a brief overview of current work at the University of Louisville toward the use of systems engineering methodologies for control of the software engineering process. While this work is still in its initial stages, the methodologies for failure modes, effects and criticality analysis seem to be particularly appropriate. Two medium size software applications of these methodologies are currently under investigation in our laboratory.
本文简要概述了路易斯维尔大学在使用系统工程方法控制软件工程过程方面的当前工作。虽然这项工作仍处于初始阶段,但失效模式、影响和临界分析的方法似乎特别合适。我们的实验室目前正在研究这些方法的两个中型软件应用程序。
{"title":"FMECA control for software development","authors":"J. Graham","doi":"10.1109/COMPSAC.2005.79","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.79","url":null,"abstract":"This paper presents a brief overview of current work at the University of Louisville toward the use of systems engineering methodologies for control of the software engineering process. While this work is still in its initial stages, the methodologies for failure modes, effects and criticality analysis seem to be particularly appropriate. Two medium size software applications of these methodologies are currently under investigation in our laboratory.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124252417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards self-testing of component-based software 面向基于组件的软件的自我测试
F. Belli, Christof J. Budnik
It is widely accepted that conventional test methods are not necessarily adequate for testing of component-based software (CBS). As a consequence, also conventional test tools cause similar problems for the test automation of CBS based on their graphical user interfaces (GUI), because for any level of user-focused testing domain knowledge and knowledge about the implementation of the CBS are essential to run the tests. The component manufacturer, on the other side, is usually not willing to deliver the code to protect his, or her, commercial interest. For solving this conflict, this paper introduces a framework for the automation of user-oriented component testing that significantly reduces the test costs. The concept is based on black-box testing techniques and utilizes the common features of commercial capture/replay test tools.
人们普遍认为,传统的测试方法对于基于组件的软件(CBS)的测试并不一定足够。因此,传统的测试工具也会对基于图形用户界面(GUI)的CBS的测试自动化造成类似的问题,因为对于任何级别的以用户为中心的测试领域知识和关于CBS实现的知识对于运行测试都是必不可少的。另一方面,组件制造商通常不愿意交付代码以保护他或她的商业利益。为了解决这一冲突,本文引入了一个面向用户的组件测试自动化框架,显著降低了测试成本。该概念基于黑盒测试技术,并利用了商业捕获/重放测试工具的常见功能。
{"title":"Towards self-testing of component-based software","authors":"F. Belli, Christof J. Budnik","doi":"10.1109/COMPSAC.2005.158","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.158","url":null,"abstract":"It is widely accepted that conventional test methods are not necessarily adequate for testing of component-based software (CBS). As a consequence, also conventional test tools cause similar problems for the test automation of CBS based on their graphical user interfaces (GUI), because for any level of user-focused testing domain knowledge and knowledge about the implementation of the CBS are essential to run the tests. The component manufacturer, on the other side, is usually not willing to deliver the code to protect his, or her, commercial interest. For solving this conflict, this paper introduces a framework for the automation of user-oriented component testing that significantly reduces the test costs. The concept is based on black-box testing techniques and utilizes the common features of commercial capture/replay test tools.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124157201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
State space approach to security quantification 安全量化的状态空间方法
C. Griffin, B. Madan, Kishor S. Trivedi
In this paper, we describe three different state space models for analyzing the security of a software system. In the first part of this paper, we utilize a semi-Markov process (SMP) to model the transitions between the security states of an abstract software system. The SMP model can be solved to obtain the probability of reaching security failed states along with the meantime to security failure (MTTSF). In the second part of the paper, we use a discrete event dynamic system model of security dynamics. We show how to derive events and transitions from existing security taxonomies. We then apply theory of discrete event control to define safety properties of the computer system in terms of the basic concepts of controllability used in discrete event control for two special sublanguages K/sub s/ and K/sub v/. These languages correspond to maximally robust controllable sub-languages. In the third approach, we show that by associating cost with the state transitions, the security quantification problem can be casted as Markov decision problem (MDP). This MOP can be solved to obtain an optimal controllable language K/sub s//spl sube/K/sub v/ the gives the minimal cost safe security policy.
本文描述了三种不同的状态空间模型,用于分析软件系统的安全性。在本文的第一部分中,我们利用半马尔可夫过程(SMP)来建模抽象软件系统的安全状态之间的转换。通过求解SMP模型,可以得到到达安全失效状态的概率以及到达安全失效的时间(MTTSF)。在论文的第二部分,我们使用了一个安全动力学的离散事件动态系统模型。我们将展示如何从现有的安全分类法派生事件和转换。然后,我们应用离散事件控制理论,根据离散事件控制中使用的可控制性的基本概念,对两个特殊的子语言K/sub s/和K/sub v/定义了计算机系统的安全性质。这些语言对应于最大鲁棒性可控子语言。在第三种方法中,我们证明了通过将成本与状态转换相关联,安全量化问题可以转换为马尔可夫决策问题(MDP)。求解该MOP可获得最优的可控语言K/sub /s //spl /sub /K/sub / v/,给出成本最小的安全安全策略。
{"title":"State space approach to security quantification","authors":"C. Griffin, B. Madan, Kishor S. Trivedi","doi":"10.1109/COMPSAC.2005.145","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.145","url":null,"abstract":"In this paper, we describe three different state space models for analyzing the security of a software system. In the first part of this paper, we utilize a semi-Markov process (SMP) to model the transitions between the security states of an abstract software system. The SMP model can be solved to obtain the probability of reaching security failed states along with the meantime to security failure (MTTSF). In the second part of the paper, we use a discrete event dynamic system model of security dynamics. We show how to derive events and transitions from existing security taxonomies. We then apply theory of discrete event control to define safety properties of the computer system in terms of the basic concepts of controllability used in discrete event control for two special sublanguages K/sub s/ and K/sub v/. These languages correspond to maximally robust controllable sub-languages. In the third approach, we show that by associating cost with the state transitions, the security quantification problem can be casted as Markov decision problem (MDP). This MOP can be solved to obtain an optimal controllable language K/sub s//spl sube/K/sub v/ the gives the minimal cost safe security policy.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"167 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
29th Annual International Computer Software and Applications Conference (COMPSAC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1