A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Confidence-Based Software Voter for Safety-Critical Systems
2014
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing
Evaluation results showed that availability and safety of confidence-based software voter in contrast with standard majority voter and adaptive majority voter has improved about 4.4%, 4.9%, and 5.8% for ...
Since the voter is a single point of failure in the techniques, availability and safety are essential requirements. In this paper a confidence-based software voting technique is proposed. ...
High-speed rail and avionics are good examples for such safety-critical systems which are at least partially controlled by software. ...
doi:10.1109/dasc.2014.43
dblp:conf/dasc/RezaeeSF14
fatcat:yoayh7lz2jakbaocmwbrf26ngi
Quantitative Security Estimation Based on Safety Architecture Design Patterns
2014
Lecture Notes on Software Engineering
To provide guidance for the system architecture selection for safety-related systems, we propose a quantitative security assessment method based on the application of design patterns. ...
Based on security threats included in the patters, we calculate a security metric to estimate the patterns' security influence for a specific system. ...
For safety-critical systems, security often does not play a primary role but is post-engineered after the safety-critical system is designed. ...
doi:10.7763/lnse.2014.v2.141
fatcat:qaa2aua6n5elnpb3n2u3rzccyq
Development Life-cycle of Critical Software Under FoCaL
2009
Electronical Notes in Theoretical Computer Science
Before their installation, critical systems must be assessed by an independent authority, who ensures that software components are really compliant with a set of requirements described in standards. ...
Upon our experience as either software safety assessor or researchers in software engineering and formal methods, we propose a development life cycle adapted to the FoCaL specificity and compliant with ...
However, safety device as such voters are used in safety critical systems as guard against transient faults. ...
doi:10.1016/j.entcs.2009.07.003
fatcat:74rxa6xrfjcfxfrfsk3s46insi
A new bitwise voting strategy for safety-critical systems with binary decisions
2015
Turkish Journal of Electrical Engineering and Computer Sciences
The main issue in controlling safety-critical systems such as nuclear power reactors or railway interlocking systems is to provide high safety and reliability where the risk ratio is at the highest level ...
In the current study a bitwise voting strategy to evaluate module decisions that are based on safe-states of variables is proposed and possible synchronization problems between the modules are determined ...
Several design and implementation methods are defined by the related standards for safety-critical systems to minimize the level of risk and possible faults. ...
doi:10.3906/elk-1306-228
fatcat:t4qp2nj67nhtbgw7ymlll7ljve
A modelling and simulation based process for dependable systems design
2007
Journal of Software and Systems Modeling
Object-Oriented Hard Real Time System (OOHARTS) [12] is a process for developing dependable hard real-time systems. It is based on UML and the hard real-time constructs of HRT-HOOD. ...
We introduce a modelling and simulation based approach which allows for the analysis and prediction of dependability constraints. ...
We plan to further investigate a generic process for the analysis and design of dependable systems. ...
doi:10.1007/s10270-007-0050-3
fatcat:ilz4qdckgbannbvftjtynknxem
Patterns for building dependable systems with trusted bases
2010
Proceedings of the 17th Conference on Pattern Languages of Programs - PLOP '10
We propose a set of patterns for structuring a system to be dependable by design. The key idea is to localize the system's most critical requirements into small, reliable parts called trusted bases. ...
We describe two instances of trusted bases: (1) the end-toend check, which localizes the correctness checking of a computation to end points of a system, and (2) the trusted kernel, which ensures the safety ...
Acknowledgments We would like to thank António Rito Silva for being a wonderful shepherd of our paper, and the members of the Writers Workshop group-Cédric Bouhours, Robert Hanmer, Kiran Kumar, Ernst Oberortner ...
doi:10.1145/2493288.2493307
dblp:conf/plop/KangJ10
fatcat:bbmzxdmqtzexnma2wzcaq3lo7e
Dependability Arguments with Trusted Bases
2010
2010 18th IEEE International Requirements Engineering Conference
This paper describes an idiom for modeling systems with trusted bases, and a technique for analyzing a dependability argumentthe argument that a trusted base is sufficient to establish a requirement. ...
An approach is suggested for arguing that a system is dependable. ...
and Scalable Analysis of Software) and 0707612 (CRI: CRD -Development of Alloy Technology and Materials). ...
doi:10.1109/re.2010.38
dblp:conf/re/KangJ10
fatcat:7y5thunucbasta2tf77smzodmy
The Methodology of N-Version Programming
2019
Asian Journal of Computer Science and Technology
Software Fault Tolerance is evolved as a technique to increase the dependability of computing systems. ...
Results of five consecutive experimental investigations are summarized, and a design paradigm for NVS is presented. In this paper, a critical review of NVP is presented. ...
Specification for the module string_function_package also defines a voter and different versions of count_digit written in C, Pascal and Fortran. ...
doi:10.51983/ajcst-2019.8.s3.2112
fatcat:zrbmn7blhvgd7kvqsrvj3r7tse
Design for Safety
[chapter]
1999
Towards System Safety
For these reasons systematic faults represent a very serious problem for the system designer. In computer-based systems one of the most common forms of systematic faults is the software 'bug'. ...
When the operation of a system has implications for safety, the system will also have a set of safety requirements. ...
doi:10.1007/978-1-4471-0823-8_1
fatcat:nemhizyz2fbtdnjjlecar3cs6u
Formal methods: use and relevance for the development of safety-critical systems
[chapter]
1993
Safety Aspects of Computer Control
In section 2 we set out the issues which have to be addressed in developing software for safety critical systems focussing particularly on how we gain confidence in the safety of systems containing software ...
The Development of Software for Safety Critical Systems Even when used in a safety critical application software cannot, directly (of itself), cause loss of life but it may control some equipment that ...
doi:10.1016/b978-0-7506-1102-2.50011-6
fatcat:yeratrxkyrd3risu25lindxpve
Formal Methods: Use and Relevance for the Development of Safety-Critical Systems
1992
Computer journal
In section 2 we set out the issues which have to be addressed in developing software for safety critical systems focussing particularly on how we gain confidence in the safety of systems containing software ...
The Development of Software for Safety Critical Systems Even when used in a safety critical application software cannot, directly (of itself), cause loss of life but it may control some equipment that ...
doi:10.1093/comjnl/35.6.579
fatcat:hj64f2ldxzhfjmosc3v2pcpzxe
Development of a Generic Voter under FoCal
[chapter]
2009
Lecture Notes in Computer Science
Safety and security are claimed major concerns by the formal FoCaL development environment. In [7] we introduced a safety development cycle customised to FoCaL. ...
We show that indeed it is feasible and we present how FoCaL features fit with software best practises like modularity, reuse, fault confinement and maintenance. ...
Indeed a voter is a central equipment of all redundant architectures, widely used for safety related systems. ...
doi:10.1007/978-3-642-02949-3_3
fatcat:44s6lnbobzg4zkvxsb4r4a6qky
A Study for Vulnerabilities Overcome in ElectronicVoting System
2015
International Journal of Software Engineering and Its Applications
E-voting is an electronic election or voting system that has strong implications in the life of the country that implements them as classified in Safety Critical Systems. ...
The use of computer based election process becomes more effective to get the tally votes and also increase the numbers of voters. Different type of e-voting creates different type of vulnerabilities. ...
Acknowledgements This work (Grants No: 1401001175) was supported by Business for Academicindustrial Cooperative establishments funded Korea Small and Medium Business Administration in 2014. ...
doi:10.14257/ijseia.2015.9.8.01
fatcat:es4cdfugnbfv5eogrizbdu7gn4
Securing Election Infrastructure with Hand-Marked Paper Ballots
2020
Journal of Science Policy & Governance
American democracy is critically threatened by the use of insecure voting systems. ...
We propose that Congress (1) allocate $110 million exclusively for transitioning away from electronic voting machines and (2) prohibit the use of federal funds for purchasing voting systems that do not ...
, except for accessible BMDs for use by people with disabilities. • Allocate $110 million exclusively for the replacement of DRE and BMD systems based on need, determined by the number of voters that use ...
doi:10.38126/jspg170106
fatcat:zk3jvqb4enhk5igsgk3rmoe7im
Building Secure Elections: E-Voting, Security, and Systems Theory
2004
PAR. Public Administration Review
A more useful theoretical guide is systems theory, which deals with complex, high-risk systems. ...
and eliminate the need for subjective recounts. ...
Proposals for voter-verified trails and open-source systems require a willingness to move toward a different model of contracting with vendors, one in which the software involved in tabulating votes would ...
doi:10.1111/j.1540-6210.2004.00400.x
fatcat:kymqlhpxdvhx3lo3txy5yh3usu
« Previous
Showing results 1 — 15 out of 3,640 results