A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Selected contributions from the Open Source Software Certification (OpenCert) workshops
2014
Science of Computer Programming
Open approaches to software and models increasingly find their way to serve safety-critical systems, and railway signalling and control is certainly one such area. ...
As part of their work they present a model in first-order logic and use a deductive verification approach to verify CAO code for cryptography-relevant security properties. ...
such efforts will help realise the various critical factors underpinning open source software projects that are successful from those that are not. ...
doi:10.1016/j.scico.2014.04.007
fatcat:lmnuuihzqvar5iajl2gd5nggsa
Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims
[article]
2020
arXiv
pre-print
evidence about the safety, security, fairness, and privacy protection of AI systems. ...
In order for AI developers to earn trust from system users, customers, civil society, governments, and other stakeholders that they are building AI responsibly, they will need to make verifiable claims ...
[36] for a discussion of some lessons for AI from auditing in other industries. 18 Model cards for model reporting [28] and data sheets for datasets [29] reveal information about AI systems publicly ...
arXiv:2004.07213v2
fatcat:4xii6rzlyffjnj3nlb47tbqi4y
Safety, reliability and security of industrial computer systems
2001
Reliability Engineering & System Safety
safety, reliability and security and of the related applications. ...
This is an area of growing interest for researchers, users and the society at large. ...
Paper [1] proposes a method for integrating design and safety analysis and for harmonising hardware safety analysis with the hazard analysis of software architectures. ...
doi:10.1016/s0951-8320(00)00075-2
fatcat:yii4lwmiivc7tczorzjeqklana
Formal Methods in Industrial Practice - Bridging the Gap (Track Summary)
[chapter]
2018
Lecture Notes in Computer Science
Already for many decades, formal methods are considered to be the way forward to help the software industry to make more reliable and trustworthy software. ...
In fact, the software industry is moving fast forward itself, and the gap between what formal methods can achieve, and the daily software development practice does not seem to get smaller (and might even ...
[15] (Model-based Testing for Avionic Systems Proven Benefits and Further Challenges) report on the transition of model-based testing (MBT) from a widely discussed research discipline to an accepted ...
doi:10.1007/978-3-030-03427-6_10
fatcat:tkpk7wmnrjgqjn3v6brvr5mca4
When Can Formal Methods Make a Real Difference?
[chapter]
2004
Lecture Notes in Computer Science
Enormous benefits await, sooner and later. ---------------------------- SIFT: Software Implemented Fault Tolerance (SRI fly-by-wire system for NASA, 1973-80): redundant system (7 CPUs, 7 memories, 7 buses ...
Emergent Trustworthiness Properties: -
- • Human safety in critical systems • Total-system reliability • System survivability despite adversities • System/network security/privacy • Interface usability ...
• Contrarian view from the 2000s: Shortsightedness and local optimization are the way of the future, and always will be. --------------------------
URLs ---------------------------- ...
doi:10.1007/978-3-540-30482-1_7
fatcat:n4jwikkcqfbcxestxxho4xoyt4
Conference Report: COMPASS '96 - The Eleventh Annual Conference on Computer Assurance, Gaithersburg, MD - June 17-21, 1996
1996
Journal of Research of the National Institute of Standards and Technology
Acknowledgments The following COMPASS '96 Conference Committee and Board members contributed to this report: Paul Anderson, Space and Naval Warfare Systems Command; Bonnie Danner, TRW Government Information ...
Services Division; and Uma Satyen, MITRE Corporation. ...
to a very large system." ...
doi:10.6028/jres.101.075
pmid:27805078
pmcid:PMC4900807
fatcat:avx7ulw2tjeo7b3zquvp4ix7la
Compass '94, Ninth Annual Conference on Computer Assurance - Gaithersburg, Md - June 27 July 1, 1994
1994
Journal of Research of the National Institute of Standards and Technology
; and David Barton, Intermetrics Corporation. ...
Acknowledgments The authors wish to acknowledge the following people for their contributions to this article: Joseph Poole, NIST; Wayne Salamon, NIST; James Graham, NIST; Uma Satyen, The MITRE Corporation ...
Most of all, COMPASS is bringing together software and hardware communities, and security and safety communities from industry, government and academia. ...
doi:10.6028/jres.099.072
fatcat:xcmn2ohgsjenrjvve36m63chye
From a Verified Kernel towards Verified Systems
[chapter]
2010
Lecture Notes in Computer Science
verified kernel may be used for gaining formal, code-level assurance about safety and security properties of systems on the order of a million lines of code. ...
This paper briefly summarises the proof, its main implications and assumptions, reports on the experience in conducting such a large-scale verification, and finally lays out a vision how this formally ...
Government is authorised to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. ...
doi:10.1007/978-3-642-17164-2_3
fatcat:askysutvofghzk2ajojawwmmgu
Compass '93, Eigth Annual Conference on Computer Assurance - Gaithersburg, Md - June 14-17, 1993
1993
Journal of Research of the National Institute of Standards and Technology
The approach builds upon lessons learned from the security engineering field to provide tentative answers for several outstanding questions in the safety field. ...
Results are promising for using the verifier for larger benchmarks. ...
doi:10.6028/jres.098.035
pmid:28053485
pmcid:PMC4907702
fatcat:gkypfyjpvrdntaexnigevomyce
Safety critical systems
2002
Proceedings of the 24th international conference on Software engineering - ICSE '02
From a software perspective, developing safety critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture ...
Many modern information systems are becoming safety-critical in a general sense because financial loss and even loss of life can result from their failure. ...
Information System Security It has become clear that security attacks against information systems are a large and growing problem. ...
doi:10.1145/581339.581406
dblp:conf/icse/Knight02
fatcat:dzaampgnlfbznj4ytc5ttz74ne
Safety critical systems
2002
Proceedings of the 24th international conference on Software engineering - ICSE '02
From a software perspective, developing safety critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture ...
Many modern information systems are becoming safety-critical in a general sense because financial loss and even loss of life can result from their failure. ...
Information System Security It has become clear that security attacks against information systems are a large and growing problem. ...
doi:10.1145/581404.581406
fatcat:y4dc2puz2feudi6pqvseybka6q
RE Theory Meets Software Practice: Lessons from the Software Development Trenches
2007
15th IEEE International Requirements Engineering Conference (RE 2007)
Based on our recent experience in four projects, each focused on either security-critical or safety-critical software, this paper evaluates several notions, widely held by RE researchers, for their utility ...
in practical software development. ...
First, critical system properties such as safety and security properties are expressed most naturally as axioms. ...
doi:10.1109/re.2007.20
dblp:conf/re/HeitmeyerJBA07
fatcat:agvs77xirrd4do3qw5qpg2hwyy
DEPENDABILITY ATTRIBUTES FOR INCREASED SECURITY IN COMPONENT-BASED SOFTWARE DEVELOPMENT
2014
Journal of Computer Science
However, the CBSD capability to develop secure software applications is lacking to date. This study is an extension of the previous study on the challenges of the security features in CBSD models. ...
Thus, these applications give rise to major concerns on the capability of the current development approach to develop secure systems. ...
The deep integration of software security into the development process and the engineering lessons from software practitioners have no substitute. ...
doi:10.3844/jcssp.2014.1298.1306
fatcat:gtglobytjrb37a7ls677je6jpi
A Study of Resilient Architecture for Critical Software-Intensive System-of-Systems (Sisos)
2016
International Journal of Advanced Computer Science and Applications
The role of critical system-of-systems have become considerably software-intensive. A critical system-of-system has to satisfy correctness properties of liveness and safety. ...
An approach has been proposed for the analysis, design, formal specification and verification of critical Software-intensive System-of-Systems. ...
Scope of Study 1) Security is not considered as a primary concern for the analysis and design of the resilient architecture for critical Software-intensive System-of-Systems (SiSoS). 2) Semantic interoperability ...
doi:10.14569/ijacsa.2016.070834
fatcat:g4kdhh7r7vg63k2dfsebkzjtx4
Lightweight Formal Verification in Real World, A Case Study
[chapter]
2014
Lecture Notes in Business Information Processing
The paper details the approach, the properties analysed, the lessons learned and concludes with possible recommendations for practitioners and designers about how to use lightweight formal verification ...
This paper describes our experience of applying lightweight formal verification to the authentication system of webinos, a substantial cross-device software infrastructure developed in a large scale EU ...
Lesson 4: Adopt OpenID over a Self-developed Module In the case of building an authentication system for the web-related software, OpenID is more thorough and secure than a "re-invented wheel". ...
doi:10.1007/978-3-319-07869-4_31
fatcat:me7kbhc7fjhp5f4dkhupwsq4ui
« Previous
Showing results 1 — 15 out of 14,682 results