Filters








3,640 Hits in 5.9 sec

A Confidence-Based Software Voter for Safety-Critical Systems

Mohammadreza Rezaee, Yasser Sedaghat, Masoud Khosravi-Farmad
2014 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing  
Evaluation results showed that availability and safety of confidence-based software voter in contrast with standard majority voter and adaptive majority voter has improved about 4.4%, 4.9%, and 5.8% for  ...  Since the voter is a single point of failure in the techniques, availability and safety are essential requirements. In this paper a confidence-based software voting technique is proposed.  ...  High-speed rail and avionics are good examples for such safety-critical systems which are at least partially controlled by software.  ... 
doi:10.1109/dasc.2014.43 dblp:conf/dasc/RezaeeSF14 fatcat:yoayh7lz2jakbaocmwbrf26ngi

Quantitative Security Estimation Based on Safety Architecture Design Patterns

Christopher Preschern, Nermin Kajtazovic, Andrea Höller, Christian Kreiner
2014 Lecture Notes on Software Engineering  
To provide guidance for the system architecture selection for safety-related systems, we propose a quantitative security assessment method based on the application of design patterns.  ...  Based on security threats included in the patters, we calculate a security metric to estimate the patterns' security influence for a specific system.  ...  For safety-critical systems, security often does not play a primary role but is post-engineered after the safety-critical system is designed.  ... 
doi:10.7763/lnse.2014.v2.141 fatcat:qaa2aua6n5elnpb3n2u3rzccyq

Development Life-cycle of Critical Software Under FoCaL

Philippe Ayrault, Thérèse Hardin, François Pessaux
2009 Electronical Notes in Theoretical Computer Science  
Before their installation, critical systems must be assessed by an independent authority, who ensures that software components are really compliant with a set of requirements described in standards.  ...  Upon our experience as either software safety assessor or researchers in software engineering and formal methods, we propose a development life cycle adapted to the FoCaL specificity and compliant with  ...  However, safety device as such voters are used in safety critical systems as guard against transient faults.  ... 
doi:10.1016/j.entcs.2009.07.003 fatcat:74rxa6xrfjcfxfrfsk3s46insi

A new bitwise voting strategy for safety-critical systems with binary decisions

Mustafa Seçkin DURMUŞ, Oytun ERİŞ, Uğur YILDIRIM, Mehmet Turan SÖYLEMEZ
2015 Turkish Journal of Electrical Engineering and Computer Sciences  
The main issue in controlling safety-critical systems such as nuclear power reactors or railway interlocking systems is to provide high safety and reliability where the risk ratio is at the highest level  ...  In the current study a bitwise voting strategy to evaluate module decisions that are based on safe-states of variables is proposed and possible synchronization problems between the modules are determined  ...  Several design and implementation methods are defined by the related standards for safety-critical systems to minimize the level of risk and possible faults.  ... 
doi:10.3906/elk-1306-228 fatcat:t4qp2nj67nhtbgw7ymlll7ljve

A modelling and simulation based process for dependable systems design

Miriam Zia, Sadaf Mustafiz, Hans Vangheluwe, Jörg Kienzle
2007 Journal of Software and Systems Modeling  
Object-Oriented Hard Real Time System (OOHARTS) [12] is a process for developing dependable hard real-time systems. It is based on UML and the hard real-time constructs of HRT-HOOD.  ...  We introduce a modelling and simulation based approach which allows for the analysis and prediction of dependability constraints.  ...  We plan to further investigate a generic process for the analysis and design of dependable systems.  ... 
doi:10.1007/s10270-007-0050-3 fatcat:ilz4qdckgbannbvftjtynknxem

Patterns for building dependable systems with trusted bases

Eunsuk Kang, Daniel Jackson
2010 Proceedings of the 17th Conference on Pattern Languages of Programs - PLOP '10  
We propose a set of patterns for structuring a system to be dependable by design. The key idea is to localize the system's most critical requirements into small, reliable parts called trusted bases.  ...  We describe two instances of trusted bases: (1) the end-toend check, which localizes the correctness checking of a computation to end points of a system, and (2) the trusted kernel, which ensures the safety  ...  Acknowledgments We would like to thank António Rito Silva for being a wonderful shepherd of our paper, and the members of the Writers Workshop group-Cédric Bouhours, Robert Hanmer, Kiran Kumar, Ernst Oberortner  ... 
doi:10.1145/2493288.2493307 dblp:conf/plop/KangJ10 fatcat:bbmzxdmqtzexnma2wzcaq3lo7e

Dependability Arguments with Trusted Bases

Eunsuk Kang, Daniel Jackson
2010 2010 18th IEEE International Requirements Engineering Conference  
This paper describes an idiom for modeling systems with trusted bases, and a technique for analyzing a dependability argumentthe argument that a trusted base is sufficient to establish a requirement.  ...  An approach is suggested for arguing that a system is dependable.  ...  and Scalable Analysis of Software) and 0707612 (CRI: CRD -Development of Alloy Technology and Materials).  ... 
doi:10.1109/re.2010.38 dblp:conf/re/KangJ10 fatcat:7y5thunucbasta2tf77smzodmy

The Methodology of N-Version Programming

Phalguna Rao Kuna
2019 Asian Journal of Computer Science and Technology  
Software Fault Tolerance is evolved as a technique to increase the dependability of computing systems.  ...  Results of five consecutive experimental investigations are summarized, and a design paradigm for NVS is presented. In this paper, a critical review of NVP is presented.  ...  Specification for the module string_function_package also defines a voter and different versions of count_digit written in C, Pascal and Fortran.  ... 
doi:10.51983/ajcst-2019.8.s3.2112 fatcat:zrbmn7blhvgd7kvqsrvj3r7tse

Design for Safety [chapter]

Neil Storey
1999 Towards System Safety  
For these reasons systematic faults represent a very serious problem for the system designer. In computer-based systems one of the most common forms of systematic faults is the software 'bug'.  ...  When the operation of a system has implications for safety, the system will also have a set of safety requirements.  ... 
doi:10.1007/978-1-4471-0823-8_1 fatcat:nemhizyz2fbtdnjjlecar3cs6u

Formal methods: use and relevance for the development of safety-critical systems [chapter]

John A. McDermid
1993 Safety Aspects of Computer Control  
In section 2 we set out the issues which have to be addressed in developing software for safety critical systems focussing particularly on how we gain confidence in the safety of systems containing software  ...  The Development of Software for Safety Critical Systems Even when used in a safety critical application software cannot, directly (of itself), cause loss of life but it may control some equipment that  ... 
doi:10.1016/b978-0-7506-1102-2.50011-6 fatcat:yeratrxkyrd3risu25lindxpve

Formal Methods: Use and Relevance for the Development of Safety-Critical Systems

L. M. Barroca, J. A. McDermid
1992 Computer journal  
In section 2 we set out the issues which have to be addressed in developing software for safety critical systems focussing particularly on how we gain confidence in the safety of systems containing software  ...  The Development of Software for Safety Critical Systems Even when used in a safety critical application software cannot, directly (of itself), cause loss of life but it may control some equipment that  ... 
doi:10.1093/comjnl/35.6.579 fatcat:hj64f2ldxzhfjmosc3v2pcpzxe

Development of a Generic Voter under FoCal [chapter]

Philippe Ayrault, Thérèse Hardin, François Pessaux
2009 Lecture Notes in Computer Science  
Safety and security are claimed major concerns by the formal FoCaL development environment. In [7] we introduced a safety development cycle customised to FoCaL.  ...  We show that indeed it is feasible and we present how FoCaL features fit with software best practises like modularity, reuse, fault confinement and maintenance.  ...  Indeed a voter is a central equipment of all redundant architectures, widely used for safety related systems.  ... 
doi:10.1007/978-3-642-02949-3_3 fatcat:44s6lnbobzg4zkvxsb4r4a6qky

A Study for Vulnerabilities Overcome in ElectronicVoting System

Suntae Kim, HyangRan Lee, Malrey Lee
2015 International Journal of Software Engineering and Its Applications  
E-voting is an electronic election or voting system that has strong implications in the life of the country that implements them as classified in Safety Critical Systems.  ...  The use of computer based election process becomes more effective to get the tally votes and also increase the numbers of voters. Different type of e-voting creates different type of vulnerabilities.  ...  Acknowledgements This work (Grants No: 1401001175) was supported by Business for Academicindustrial Cooperative establishments funded Korea Small and Medium Business Administration in 2014.  ... 
doi:10.14257/ijseia.2015.9.8.01 fatcat:es4cdfugnbfv5eogrizbdu7gn4

Securing Election Infrastructure with Hand-Marked Paper Ballots

Varun Gupta, Joel Hypolite, Stephen Mell, Hersh Sanghvi
2020 Journal of Science Policy & Governance  
American democracy is critically threatened by the use of insecure voting systems.  ...  We propose that Congress (1) allocate $110 million exclusively for transitioning away from electronic voting machines and (2) prohibit the use of federal funds for purchasing voting systems that do not  ...  , except for accessible BMDs for use by people with disabilities. • Allocate $110 million exclusively for the replacement of DRE and BMD systems based on need, determined by the number of voters that use  ... 
doi:10.38126/jspg170106 fatcat:zk3jvqb4enhk5igsgk3rmoe7im

Building Secure Elections: E-Voting, Security, and Systems Theory

Donald P. Moynihan
2004 PAR. Public Administration Review  
A more useful theoretical guide is systems theory, which deals with complex, high-risk systems.  ...  and eliminate the need for subjective recounts.  ...  Proposals for voter-verified trails and open-source systems require a willingness to move toward a different model of contracting with vendors, one in which the software involved in tabulating votes would  ... 
doi:10.1111/j.1540-6210.2004.00400.x fatcat:kymqlhpxdvhx3lo3txy5yh3usu
« Previous Showing results 1 — 15 out of 3,640 results