The proceedings contain 35 papers. The topics discussed include: a method of analysis and verification for safety-critical software based on modeling and testing;synthesizing SRN models from system operations with Sys...
ISBN:
(纸本)9780769544540
The proceedings contain 35 papers. The topics discussed include: a method of analysis and verification for safety-critical software based on modeling and testing;synthesizing SRN models from system operations with SysML diagrams for availability analysis;a learning environment for software security education;feedback-directed test case generation based on UML activity diagrams;case study on installing a porting process for embedded operating system in a small team;secure machine learning, a brief overview;study on formal specification of automatic train protection and block system for local line;specification and verification of UML2.0 sequence diagrams using event deterministic finite automata;static data race detection for interrupt-driven embedded software;approximate simulation for metric hybrid input/output automata;a domain-specific safety analysis for digital nuclear plant protection systems;and multi-layered adaptive monitoring in service robots.
The proceedings contain 28 papers. The topics discussed include: an automatic approach to model checking UML state machines;an automatic approach to verify sensor network systems;modeling and analysis of advanced auto...
ISBN:
(纸本)9780769540870
The proceedings contain 28 papers. The topics discussed include: an automatic approach to model checking UML state machines;an automatic approach to verify sensor network systems;modeling and analysis of advanced automotive ECU architectures at early design stages using EMF and model transformation;an efficient method of probabilistic model checking;parallel lexical analyzer on the cell processor;structured assurance case methodology for assessing software trustworthiness;the problem of usable binary authentication;towards verification of a service orchestration language;design patterns for integrating variability in timed automata;modeling efficient multi-chained stream signature protocol using communicating sequential processes;event- and coverage-based testing of web services;generalized partial test case generation method;and are longer test sequences always better? a reliability theoretical analysis.
The proceedings contain 27 papers. The topics discussed include: recent catastrophic accidents: investigating how software was responsible;modeling and verification of safety critical systems: a case study on pacemake...
ISBN:
(纸本)9780769540863
The proceedings contain 27 papers. The topics discussed include: recent catastrophic accidents: investigating how software was responsible;modeling and verification of safety critical systems: a case study on pacemaker;discovering anomalies in semantic web rules;aligning security requirements and security assurance using the common criteria;an agent-based system to support assurance of security requirements;model-based argument analysis for evolving security requirements;failure type-aware reliability assessment with component failure dependency;softwarereliability modeling with integrated test coverage;sensitivity of two coverage-based softwarereliability models to variations in the operational profile;a formal framework for mutation testing;an industrial case study on speeding up user acceptance testing by mining execution logs;a decompositional approach to automatic test case generation based on formal specifications.
The proceedings contain 59 papers. The topics discussed include: automated web service composition system on enterprise service bus;architectural availability analysis of software decomposition for local recovery;recu...
ISBN:
(纸本)9780769537580
The proceedings contain 59 papers. The topics discussed include: automated web service composition system on enterprise service bus;architectural availability analysis of software decomposition for local recovery;recursive decomposition of progress graphs;scheduling and controlling semantics for distributed resource based computing engines;a trust-based detecting mechanism against profile injection attacks in recommender systems;detection of multiple-duty-related security leakage in access control policies;a game theoretic approach to decision and analysis in strategies of attack and defense;verifying aspect-oriented programs using open temporal logic;anchored text for software weaving and merging;visualizing multiple program executions to assist behavior verification;state space reduction for verifying noninterference;and an analysis for understanding software security requirement methodologies.
The proceedings contain 24 papers. The topics discussed include: component-based malicious software engineer intrusion detection;execution constraint verification of exception handling on UML sequence diagrams;runtime...
ISBN:
(纸本)9780769544533
The proceedings contain 24 papers. The topics discussed include: component-based malicious software engineer intrusion detection;execution constraint verification of exception handling on UML sequence diagrams;runtime verification of domain-specific models of physical characteristics in control software;validation of SDL-based architectural design models: new coverage criteria;using partial ordered numbers to control information flows;security goals assurance based on software active monitoring;model-driven monitoring of time-critical systems based on aspect-oriented programming;a feature-based modeling approach for building hybrid access control systems;a practical covert channel identification approach in source code based on directed information flow graph;comprehensive two-level analysis of static and dynamic RBAC constraints with UML and OCL;and mutation-based evaluation of weighted test case selection for firewall testing.
暂无评论