A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A compliance notation for verifying concurrent systems
2002
Proceedings of the 24th international conference on Software engineering - ICSE '02
Compliance Notation and Verification of Concurrent System Recently, there has been growing evidence about the merit of the notation as a successful tool for system verification. ...
Eventually, in order to show the viability of the new compliance notation, we shall use realistic case studies of Flight Control Systems (FCS), which are known to be safety-critical applications. ...
doi:10.1145/581339.581475
dblp:conf/icse/AtiyaK02
fatcat:wqurookxjzaq5grscmckswljbu
Formalizing Software Architectures for Embedded Systems
[chapter]
2001
Lecture Notes in Computer Science
. • remote procedure calls • concurrent processes • stochastic performance metrics Goals • co-host mission-critical event-triggered models and safety-critical time-triggered models in partitioned IMA systems ...
.• Potential UML-RT profile for safety-critical hard real-time discipline-specific
design notations and
editing and
visualization tools
formal modeling
and analysis methods
and tools
implementation ...
Safety Modeling Safety Modeling Language should be extended ...
doi:10.1007/3-540-45449-7_31
fatcat:cnixxfci7rda7e5vb5r4ucykda
Annotated Z bibliography
1995
Information and Software Technology
Safety-critical software: status report and annotated bibliography Some examples of the application of Z to safety-critical systems are: [152, 153, 154] Jacky. ...
Using Z to specify a safety-critical system in the medical sector [250] Ruddle. ...
doi:10.1016/0950-5849(95)99367-v
fatcat:mxi5kzu2sfabzpgfywdtdj5vaq
Industrial Experiences of Building a Safety Case in Compliance with ISO 26262
2012
2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops
One crucial requirement consists of the creation of a safety case, a structured argument, which inter-relates evidence and claims, needed to show that safety-critical systems are acceptably safe. ...
of global system safety for heavy trucks manufactured by Scania. ...
ACKNOWLEDGMENT This work has been partially supported by the SYNOPSIS project [1] and VINNOVA Espresso project (see http://www.vinnova.se/sv/Resultat/Projekt/Effekta/ESPRESSO). ...
doi:10.1109/issrew.2012.86
dblp:conf/issre/DardarGJLN12
fatcat:nftrow3pczc7xnrfgln6haw4mm
High-Assurance Separation Kernels: A Survey on Formal Methods
[article]
2017
arXiv
pre-print
Finally, four challenges and their possible technical directions for future research are identified, e.g. specification bottleneck, multicore and concurrency, and automation of full formal verification ...
Formal methods are mandated by the security/safety certification of separation kernels and have been carried out since this concept emerged. ...
Due to the integration of safety and security, this property has been considered with security-critical systems. ...
arXiv:1701.01535v1
fatcat:wivlgaqkmffc5nb2kalmpy77sy
Formal Certification and Compliance for Run-Time Service Environments
2012
2012 IEEE Ninth International Conference on Services Computing
Permanent repository link: http://openaccess.city.ac.uk/4663/ Link to published version: http://dx.Abstract-With the increased awareness of security and safety of services in on-demand distributed service ...
Providing an integrated approach to certification and compliance is a challenge however using analysis and monitoring techniques we present such an approach for on-going compliance checking. ...
ACKNOWLEDGEMENTS Our work reported in this paper has been supported by the EU project ASSERT4SOA -Trustworthy ICT (ICT-2009.1.4). ...
doi:10.1109/scc.2012.23
dblp:conf/IEEEscc/FosterSM12
fatcat:v7tuavkux5hsxdvmbk6bloerd4
Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262
[article]
2018
arXiv
pre-print
In automotive development, safety is a critical objective, and the emergence of standards such as ISO 26262 has helped focus industry practices to address safety in a systematic and consistent way. ...
and the need to improve safety. ...
The understanding of how to use ML safely is still in its infancy. Many of the ideas presented in this report represent research being conducted by us and others. ...
arXiv:1808.01614v1
fatcat:x4kmbhyjczax7kizww4angrgcu
A static compliance-checking framework for business process models
2007
IBM Systems Journal
The benefit of our method is threefold: Through the automated verification of a large set of business process models, our approach increases deployment efficiency and lowers the risk of installing non-compliant ...
Regulatory compliance of business operations is a critical problem for enterprises. ...
The ordering of the author list follows the principle of alphabetical ordering according to the first character of family name. ...
doi:10.1147/sj.462.0335
fatcat:pqpnxtibaja27dr2rcetvvwdda
Helping system engineers bridge the peaks
2014
Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture - TwinPeaks 2014
In our experience at NASA, system engineers generally follow the Twin Peaks approach when developing safety-critical systems. ...
The key to the approach is a formal language notation that a) system engineers are comfortable with, b) is supported by a family of automated V&V tools, and c) is semantically rich enough to describe the ...
ACKNOWLEDGEMENT The authors would like to thank Steven Miller of Rockwell Collins Inc., for the Microwave controller Simulink model. ...
doi:10.1145/2593861.2593863
dblp:conf/icse/RungtaTPBWCG14
fatcat:ww5ybjnjyfh3rggmy5ow67pdzu
Assuring and evolving concurrent programs
2002
Proceedings of the 24th international conference on Software engineering - ICSE '02
The novel technical features of this approach include (1) flexible encapsulation via aggregations of state that can cross object boundaries~ (2) the association of locks with state aggregations, (3) policy ...
Our intent is both to assist in establishing "thread safety" attributes in code and to support tools that safely restructure code-for example, shifting critical section boundaries or splitting locks. ...
Our notation and examples are based in Java. Java's approach to shared-memory lock-based concurrency is typical among modern languages. ...
doi:10.1145/581339.581395
dblp:conf/icse/GreenhouseS02
fatcat:vvqmqaicnvfsrffs6faea2yh5y
Certifiably safe software-dependent systems: challenges and directions
2014
Proceedings of the on Future of Software Engineering - FOSE 2014
This paper considers the future of software engineering as needed to support development and certification of safety-critical softwaredependent systems. ...
Mere compliance with existing standards, techniques, and regulations cannot guarantee the safety properties of these systems. The gap between practice and capability is increasing rapidly. ...
The authors also deeply appreciate the support and patience of the FoSE 2014 organizers Matt Dwyer and Jim Herbsleb during the preparation of this paper. ...
doi:10.1145/2593882.2593895
dblp:conf/icse/HatcliffWKCJ14
fatcat:cclqub6ianezlgyt4o7e4wp4ja
A Survey on Formal Verification Approaches for Dependable Systems
[article]
2022
arXiv
pre-print
The complexity of digital embedded systems has been increasing in different safety-critical applications such as industrial automation, process control, transportation, and medical digital devices. ...
To detect these errors and eliminate their effects on the system, new error detection approaches must be innovated and used in the design of the digital system. ...
It is also very important to assure that the safety-critical system (SCS) is working correctly. ...
arXiv:2204.12913v1
fatcat:y7jyq2gdjrgyxjtyibuknintfq
A practical approach to security assessment
1997
Proceedings of the 1997 workshop on New security paradigms - NSPW '97
But a risk-driven process invalidates many of the assumptions made by conventional approaches to the specification and verification of security requirements. ...
It allows varying degrees of formality to be used: both across the components of the system, and through the development process. ...
MOATS are developed concurrently with system specification, design, and verification. ...
doi:10.1145/283699.283731
dblp:conf/nspw/KienzleW97
fatcat:od22xt24gjdopiczxry2e2fyuy
Compatibility verification for Web service choreography
2004
Proceedings. IEEE International Conference on Web Services, 2004.
The move towards implementing web service compositions by multiple interested parties as a form of distributed system architecture promotes the ability to support 1) compatibility verification of activities ...
The described approach is supported by a suite of cooperating tools for specification, formal modeling and providing verification results from orchestrated web service interactions. ...
The authors would like to acknowledge that this research was supported, in part, by the STATUS ESPIRIT project (IST-2001-32298), the EPSRC READS project (GR/S03270/01) and by an IBM Innovation Award (2004 ...
doi:10.1109/icws.2004.1314806
dblp:conf/icws/FosterUMK04
fatcat:rdakpqjkrrf7bd5mpykzfgijz4
Formal Approach for the Verification of Onboard Autonomous Functions in Observation Satellites
[article]
2020
arXiv
pre-print
We leverage this approach in order to develop a safety critical software, a "telecommand verifier", that is in charge of checking onboard whether a sequence of instructions is safe for execution. ...
We propose a new approach for modelling the functional behaviour of an Earth observation satellite. ...
of safety. ...
arXiv:2001.11875v1
fatcat:qwpovuncnfeobeykf2qo4caqma
« Previous
Showing results 1 — 15 out of 1,665 results