Filters








14,682 Hits in 3.9 sec

Selected contributions from the Open Source Software Certification (OpenCert) workshops

Luís Soares Barbosa, Siraj Ahmed Shaikh
2014 Science of Computer Programming  
Open approaches to software and models increasingly find their way to serve safety-critical systems, and railway signalling and control is certainly one such area.  ...  As part of their work they present a model in first-order logic and use a deductive verification approach to verify CAO code for cryptography-relevant security properties.  ...  such efforts will help realise the various critical factors underpinning open source software projects that are successful from those that are not.  ... 
doi:10.1016/j.scico.2014.04.007 fatcat:lmnuuihzqvar5iajl2gd5nggsa

Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims [article]

Miles Brundage, Shahar Avin, Jasmine Wang, Haydn Belfield, Gretchen Krueger, Gillian Hadfield, Heidy Khlaaf, Jingying Yang, Helen Toner, Ruth Fong, Tegan Maharaj, Pang Wei Koh (+47 others)
2020 arXiv   pre-print
evidence about the safety, security, fairness, and privacy protection of AI systems.  ...  In order for AI developers to earn trust from system users, customers, civil society, governments, and other stakeholders that they are building AI responsibly, they will need to make verifiable claims  ...  [36] for a discussion of some lessons for AI from auditing in other industries. 18 Model cards for model reporting [28] and data sheets for datasets [29] reveal information about AI systems publicly  ... 
arXiv:2004.07213v2 fatcat:4xii6rzlyffjnj3nlb47tbqi4y

Safety, reliability and security of industrial computer systems

K Kanoun, A Pasquini
2001 Reliability Engineering & System Safety  
safety, reliability and security and of the related applications.  ...  This is an area of growing interest for researchers, users and the society at large.  ...  Paper [1] proposes a method for integrating design and safety analysis and for harmonising hardware safety analysis with the hazard analysis of software architectures.  ... 
doi:10.1016/s0951-8320(00)00075-2 fatcat:yii4lwmiivc7tczorzjeqklana

Formal Methods in Industrial Practice - Bridging the Gap (Track Summary) [chapter]

Michael Felderer, Dilian Gurov, Marieke Huisman, Björn Lisper, Rupert Schlick
2018 Lecture Notes in Computer Science  
Already for many decades, formal methods are considered to be the way forward to help the software industry to make more reliable and trustworthy software.  ...  In fact, the software industry is moving fast forward itself, and the gap between what formal methods can achieve, and the daily software development practice does not seem to get smaller (and might even  ...  [15] (Model-based Testing for Avionic Systems Proven Benefits and Further Challenges) report on the transition of model-based testing (MBT) from a widely discussed research discipline to an accepted  ... 
doi:10.1007/978-3-030-03427-6_10 fatcat:tkpk7wmnrjgqjn3v6brvr5mca4

When Can Formal Methods Make a Real Difference? [chapter]

Peter G. Neumann
2004 Lecture Notes in Computer Science  
Enormous benefits await, sooner and later. ---------------------------- SIFT: Software Implemented Fault Tolerance (SRI fly-by-wire system for NASA, 1973-80): redundant system (7 CPUs, 7 memories, 7 buses  ...  Emergent Trustworthiness Properties: - - • Human safety in critical systems • Total-system reliability • System survivability despite adversities • System/network security/privacy • Interface usability  ...  • Contrarian view from the 2000s: Shortsightedness and local optimization are the way of the future, and always will be. -------------------------- URLs ----------------------------  ... 
doi:10.1007/978-3-540-30482-1_7 fatcat:n4jwikkcqfbcxestxxho4xoyt4

Conference Report: COMPASS '96 - The Eleventh Annual Conference on Computer Assurance, Gaithersburg, MD - June 17-21, 1996

K. Ferraiolo, L.M. Ippolito
1996 Journal of Research of the National Institute of Standards and Technology  
Acknowledgments The following COMPASS '96 Conference Committee and Board members contributed to this report: Paul Anderson, Space and Naval Warfare Systems Command; Bonnie Danner, TRW Government Information  ...  Services Division; and Uma Satyen, MITRE Corporation.  ...  to a very large system."  ... 
doi:10.6028/jres.101.075 pmid:27805078 pmcid:PMC4900807 fatcat:avx7ulw2tjeo7b3zquvp4ix7la

Compass '94, Ninth Annual Conference on Computer Assurance - Gaithersburg, Md - June 27 July 1, 1994

L.M. Ippolito, D.R. Wallace, E.B. Lennon
1994 Journal of Research of the National Institute of Standards and Technology  
; and David Barton, Intermetrics Corporation.  ...  Acknowledgments The authors wish to acknowledge the following people for their contributions to this article: Joseph Poole, NIST; Wayne Salamon, NIST; James Graham, NIST; Uma Satyen, The MITRE Corporation  ...  Most of all, COMPASS is bringing together software and hardware communities, and security and safety communities from industry, government and academia.  ... 
doi:10.6028/jres.099.072 fatcat:xcmn2ohgsjenrjvve36m63chye

From a Verified Kernel towards Verified Systems [chapter]

Gerwin Klein
2010 Lecture Notes in Computer Science  
verified kernel may be used for gaining formal, code-level assurance about safety and security properties of systems on the order of a million lines of code.  ...  This paper briefly summarises the proof, its main implications and assumptions, reports on the experience in conducting such a large-scale verification, and finally lays out a vision how this formally  ...  Government is authorised to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1007/978-3-642-17164-2_3 fatcat:askysutvofghzk2ajojawwmmgu

Compass '93, Eigth Annual Conference on Computer Assurance - Gaithersburg, Md - June 14-17, 1993

D.R. Wallace, E.B. Lennon
1993 Journal of Research of the National Institute of Standards and Technology  
The approach builds upon lessons learned from the security engineering field to provide tentative answers for several outstanding questions in the safety field.  ...  Results are promising for using the verifier for larger benchmarks.  ... 
doi:10.6028/jres.098.035 pmid:28053485 pmcid:PMC4907702 fatcat:gkypfyjpvrdntaexnigevomyce

Safety critical systems

John C. Knight
2002 Proceedings of the 24th international conference on Software engineering - ICSE '02  
From a software perspective, developing safety critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture  ...  Many modern information systems are becoming safety-critical in a general sense because financial loss and even loss of life can result from their failure.  ...  Information System Security It has become clear that security attacks against information systems are a large and growing problem.  ... 
doi:10.1145/581339.581406 dblp:conf/icse/Knight02 fatcat:dzaampgnlfbznj4ytc5ttz74ne

Safety critical systems

John C. Knight
2002 Proceedings of the 24th international conference on Software engineering - ICSE '02  
From a software perspective, developing safety critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture  ...  Many modern information systems are becoming safety-critical in a general sense because financial loss and even loss of life can result from their failure.  ...  Information System Security It has become clear that security attacks against information systems are a large and growing problem.  ... 
doi:10.1145/581404.581406 fatcat:y4dc2puz2feudi6pqvseybka6q

RE Theory Meets Software Practice: Lessons from the Software Development Trenches

Constance Heitmeyer, Ralph Jeffords, Ramesh Bharadwaj, Myla Archer
2007 15th IEEE International Requirements Engineering Conference (RE 2007)  
Based on our recent experience in four projects, each focused on either security-critical or safety-critical software, this paper evaluates several notions, widely held by RE researchers, for their utility  ...  in practical software development.  ...  First, critical system properties such as safety and security properties are expressed most naturally as axioms.  ... 
doi:10.1109/re.2007.20 dblp:conf/re/HeitmeyerJBA07 fatcat:agvs77xirrd4do3qw5qpg2hwyy

DEPENDABILITY ATTRIBUTES FOR INCREASED SECURITY IN COMPONENT-BASED SOFTWARE DEVELOPMENT

Kahtan
2014 Journal of Computer Science  
However, the CBSD capability to develop secure software applications is lacking to date. This study is an extension of the previous study on the challenges of the security features in CBSD models.  ...  Thus, these applications give rise to major concerns on the capability of the current development approach to develop secure systems.  ...  The deep integration of software security into the development process and the engineering lessons from software practitioners have no substitute.  ... 
doi:10.3844/jcssp.2014.1298.1306 fatcat:gtglobytjrb37a7ls677je6jpi

A Study of Resilient Architecture for Critical Software-Intensive System-of-Systems (Sisos)

Nadeem Akhtar, Malik Muhammad, Nadeem Salamat, Amnah Firdous, Mujtaba Husnain
2016 International Journal of Advanced Computer Science and Applications  
The role of critical system-of-systems have become considerably software-intensive. A critical system-of-system has to satisfy correctness properties of liveness and safety.  ...  An approach has been proposed for the analysis, design, formal specification and verification of critical Software-intensive System-of-Systems.  ...  Scope of Study 1) Security is not considered as a primary concern for the analysis and design of the resilient architecture for critical Software-intensive System-of-Systems (SiSoS). 2) Semantic interoperability  ... 
doi:10.14569/ijacsa.2016.070834 fatcat:g4kdhh7r7vg63k2dfsebkzjtx4

Lightweight Formal Verification in Real World, A Case Study [chapter]

Andrea Atzeni, Tao Su, Teodoro Montanaro
2014 Lecture Notes in Business Information Processing  
The paper details the approach, the properties analysed, the lessons learned and concludes with possible recommendations for practitioners and designers about how to use lightweight formal verification  ...  This paper describes our experience of applying lightweight formal verification to the authentication system of webinos, a substantial cross-device software infrastructure developed in a large scale EU  ...  Lesson 4: Adopt OpenID over a Self-developed Module In the case of building an authentication system for the web-related software, OpenID is more thorough and secure than a "re-invented wheel".  ... 
doi:10.1007/978-3-319-07869-4_31 fatcat:me7kbhc7fjhp5f4dkhupwsq4ui
« Previous Showing results 1 — 15 out of 14,682 results