Filters








1,665 Hits in 5.3 sec

A compliance notation for verifying concurrent systems

D. M. Atiya, S. King
2002 Proceedings of the 24th international conference on Software engineering - ICSE '02  
Compliance Notation and Verification of Concurrent System Recently, there has been growing evidence about the merit of the notation as a successful tool for system verification.  ...  Eventually, in order to show the viability of the new compliance notation, we shall use realistic case studies of Flight Control Systems (FCS), which are known to be safety-critical applications.  ... 
doi:10.1145/581339.581475 dblp:conf/icse/AtiyaK02 fatcat:wqurookxjzaq5grscmckswljbu

Formalizing Software Architectures for Embedded Systems [chapter]

Pam Binns, Steve Vestal
2001 Lecture Notes in Computer Science  
. • remote procedure calls • concurrent processes • stochastic performance metrics Goals • co-host mission-critical event-triggered models and safety-critical time-triggered models in partitioned IMA systems  ...  .• Potential UML-RT profile for safety-critical hard real-time discipline-specific design notations and editing and visualization tools formal modeling and analysis methods and tools implementation  ...  Safety Modeling Safety Modeling Language should be extended  ... 
doi:10.1007/3-540-45449-7_31 fatcat:cnixxfci7rda7e5vb5r4ucykda

Annotated Z bibliography

Jonathan Bowen, Susan Stepney, Rosalind Barden
1995 Information and Software Technology  
Safety-critical software: status report and annotated bibliography Some examples of the application of Z to safety-critical systems are: [152, 153, 154] Jacky.  ...  Using Z to specify a safety-critical system in the medical sector [250] Ruddle.  ... 
doi:10.1016/0950-5849(95)99367-v fatcat:mxi5kzu2sfabzpgfywdtdj5vaq

Industrial Experiences of Building a Safety Case in Compliance with ISO 26262

R. Dardar, B. Gallina, A. Johnsen, K. Lundqvist, M. Nyberg
2012 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops  
One crucial requirement consists of the creation of a safety case, a structured argument, which inter-relates evidence and claims, needed to show that safety-critical systems are acceptably safe.  ...  of global system safety for heavy trucks manufactured by Scania.  ...  ACKNOWLEDGMENT This work has been partially supported by the SYNOPSIS project [1] and VINNOVA Espresso project (see http://www.vinnova.se/sv/Resultat/Projekt/Effekta/ESPRESSO).  ... 
doi:10.1109/issrew.2012.86 dblp:conf/issre/DardarGJLN12 fatcat:nftrow3pczc7xnrfgln6haw4mm

High-Assurance Separation Kernels: A Survey on Formal Methods [article]

Yongwang Zhao, David Sanan, Fuyuan Zhang, Yang Liu
2017 arXiv   pre-print
Finally, four challenges and their possible technical directions for future research are identified, e.g. specification bottleneck, multicore and concurrency, and automation of full formal verification  ...  Formal methods are mandated by the security/safety certification of separation kernels and have been carried out since this concept emerged.  ...  Due to the integration of safety and security, this property has been considered with security-critical systems.  ... 
arXiv:1701.01535v1 fatcat:wivlgaqkmffc5nb2kalmpy77sy

Formal Certification and Compliance for Run-Time Service Environments

Howard Foster, George Spanoudakis, Khaled Mahbub
2012 2012 IEEE Ninth International Conference on Services Computing  
Permanent repository link: http://openaccess.city.ac.uk/4663/ Link to published version: http://dx.Abstract-With the increased awareness of security and safety of services in on-demand distributed service  ...  Providing an integrated approach to certification and compliance is a challenge however using analysis and monitoring techniques we present such an approach for on-going compliance checking.  ...  ACKNOWLEDGEMENTS Our work reported in this paper has been supported by the EU project ASSERT4SOA -Trustworthy ICT (ICT-2009.1.4).  ... 
doi:10.1109/scc.2012.23 dblp:conf/IEEEscc/FosterSM12 fatcat:v7tuavkux5hsxdvmbk6bloerd4

Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262 [article]

Rick Salay, Krzysztof Czarnecki
2018 arXiv   pre-print
In automotive development, safety is a critical objective, and the emergence of standards such as ISO 26262 has helped focus industry practices to address safety in a systematic and consistent way.  ...  and the need to improve safety.  ...  The understanding of how to use ML safely is still in its infancy. Many of the ideas presented in this report represent research being conducted by us and others.  ... 
arXiv:1808.01614v1 fatcat:x4kmbhyjczax7kizww4angrgcu

A static compliance-checking framework for business process models

Y. Liu, S. Muller, K. Xu
2007 IBM Systems Journal  
The benefit of our method is threefold: Through the automated verification of a large set of business process models, our approach increases deployment efficiency and lowers the risk of installing non-compliant  ...  Regulatory compliance of business operations is a critical problem for enterprises.  ...  The ordering of the author list follows the principle of alphabetical ordering according to the first character of family name.  ... 
doi:10.1147/sj.462.0335 fatcat:pqpnxtibaja27dr2rcetvvwdda

Helping system engineers bridge the peaks

Neha Rungta, Oksana Tkachuk, Suzette Person, Jason Biatek, Michael W. Whalen, Joseph Castle, Karen Gundy-Burlet
2014 Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture - TwinPeaks 2014  
In our experience at NASA, system engineers generally follow the Twin Peaks approach when developing safety-critical systems.  ...  The key to the approach is a formal language notation that a) system engineers are comfortable with, b) is supported by a family of automated V&V tools, and c) is semantically rich enough to describe the  ...  ACKNOWLEDGEMENT The authors would like to thank Steven Miller of Rockwell Collins Inc., for the Microwave controller Simulink model.  ... 
doi:10.1145/2593861.2593863 dblp:conf/icse/RungtaTPBWCG14 fatcat:ww5ybjnjyfh3rggmy5ow67pdzu

Assuring and evolving concurrent programs

Aaron Greenhouse, William L. Scherlis
2002 Proceedings of the 24th international conference on Software engineering - ICSE '02  
The novel technical features of this approach include (1) flexible encapsulation via aggregations of state that can cross object boundaries~ (2) the association of locks with state aggregations, (3) policy  ...  Our intent is both to assist in establishing "thread safety" attributes in code and to support tools that safely restructure code-for example, shifting critical section boundaries or splitting locks.  ...  Our notation and examples are based in Java. Java's approach to shared-memory lock-based concurrency is typical among modern languages.  ... 
doi:10.1145/581339.581395 dblp:conf/icse/GreenhouseS02 fatcat:vvqmqaicnvfsrffs6faea2yh5y

Certifiably safe software-dependent systems: challenges and directions

John Hatcliff, Alan Wassyng, Tim Kelly, Cyrille Comar, Paul Jones
2014 Proceedings of the on Future of Software Engineering - FOSE 2014  
This paper considers the future of software engineering as needed to support development and certification of safety-critical softwaredependent systems.  ...  Mere compliance with existing standards, techniques, and regulations cannot guarantee the safety properties of these systems. The gap between practice and capability is increasing rapidly.  ...  The authors also deeply appreciate the support and patience of the FoSE 2014 organizers Matt Dwyer and Jim Herbsleb during the preparation of this paper.  ... 
doi:10.1145/2593882.2593895 dblp:conf/icse/HatcliffWKCJ14 fatcat:cclqub6ianezlgyt4o7e4wp4ja

A Survey on Formal Verification Approaches for Dependable Systems [article]

Fayhaa Hameedi Khlaif, Shawkat Sabah Khairullah
2022 arXiv   pre-print
The complexity of digital embedded systems has been increasing in different safety-critical applications such as industrial automation, process control, transportation, and medical digital devices.  ...  To detect these errors and eliminate their effects on the system, new error detection approaches must be innovated and used in the design of the digital system.  ...  It is also very important to assure that the safety-critical system (SCS) is working correctly.  ... 
arXiv:2204.12913v1 fatcat:y7jyq2gdjrgyxjtyibuknintfq

A practical approach to security assessment

Darrell M. Kienzle, William A. Wulf
1997 Proceedings of the 1997 workshop on New security paradigms - NSPW '97  
But a risk-driven process invalidates many of the assumptions made by conventional approaches to the specification and verification of security requirements.  ...  It allows varying degrees of formality to be used: both across the components of the system, and through the development process.  ...  MOATS are developed concurrently with system specification, design, and verification.  ... 
doi:10.1145/283699.283731 dblp:conf/nspw/KienzleW97 fatcat:od22xt24gjdopiczxry2e2fyuy

Compatibility verification for Web service choreography

H. Foster, S. Uchitel, J. Magee, J. Kramer
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
The move towards implementing web service compositions by multiple interested parties as a form of distributed system architecture promotes the ability to support 1) compatibility verification of activities  ...  The described approach is supported by a suite of cooperating tools for specification, formal modeling and providing verification results from orchestrated web service interactions.  ...  The authors would like to acknowledge that this research was supported, in part, by the STATUS ESPIRIT project (IST-2001-32298), the EPSRC READS project (GR/S03270/01) and by an IBM Innovation Award (2004  ... 
doi:10.1109/icws.2004.1314806 dblp:conf/icws/FosterUMK04 fatcat:rdakpqjkrrf7bd5mpykzfgijz4

Formal Approach for the Verification of Onboard Autonomous Functions in Observation Satellites [article]

Vincent Mussot, Silvano Dal Zilio, Loic Correnson, Serge Rainjonneau, Yves Bardout, Grégoire Scano
2020 arXiv   pre-print
We leverage this approach in order to develop a safety critical software, a "telecommand verifier", that is in charge of checking onboard whether a sequence of instructions is safe for execution.  ...  We propose a new approach for modelling the functional behaviour of an Earth observation satellite.  ...  of safety.  ... 
arXiv:2001.11875v1 fatcat:qwpovuncnfeobeykf2qo4caqma
« Previous Showing results 1 — 15 out of 1,665 results