This is an innovative practice full paper. The need to develop software securely cannot be over-emphasized. The changing legal and regulatory international and local landscape for software requirements is astounding. ...
详细信息
ISBN:
(纸本)9781665438513
This is an innovative practice full paper. The need to develop software securely cannot be over-emphasized. The changing legal and regulatory international and local landscape for software requirements is astounding. For example, the European Union's General Data Protection Regulation (GDPR), the United States' Health Insurance Portability and Accountability Act (HIPAA), the Chinese Cybersecurity laws, and the credit card industry's Payment Card Industry Data Security Standard (PCI-DSS) are all upholding higher standards for system development and deployment. Such legal and regulatory changes of necessity require modifications and updating in software development methods that must be incorporated into cybersecurity software development courses to properly prepare students for successfully working in the field. To address these and other changes within the computing field, the Accreditation Board for Engineering (ABET) recently proposed preliminary cybersecurity accreditation criteria for which fewer than 20 universities have both applied and become ABET Cybersecurity accredited. The accreditation requires maintaining continuous course improvement in the core courses including a secure software development course. This research first reports on important topics incorporated into a senior-level secure software development for cybersecurity majors. Our research then analyses student Institutional Review Board (IRB) approved surveys to learn which course components could benefit from continuous course improvements. We apply machine learning to help build categories for ABET continual improvement. Finally, we share lessons learned and plans for future work.
The software platform has been developed in java language to handle the basic problems of discrete event systems that are modeled by Petri nets. A user-friendly graphical interface allows to activate simulation modes ...
详细信息
ISBN:
(纸本)9781538660898
The software platform has been developed in java language to handle the basic problems of discrete event systems that are modeled by Petri nets. A user-friendly graphical interface allows to activate simulation modes covering the key topics of analyses such as the basic properties analysis, reachability graph analysis, partial reachability graph analysis, path analysis, minimal siphons and traps analysis, P/T inequality analysis, and dynamic step analysis. Similarly, we have done a lot of programming innovation, such as in the data structure and search algorithm, in order to make the software more efficient. Compared with other software, ours can be quicker to attain the simulation results. Moreover, our Petri net simulator proves to be a valuable aid for Control Engineering education. We consider to open all source codes which are related to basic properties about the Petri nets so as to assist more research teams to reduce the difficulty when developing their own simulation platforms.
java is a widely used programming language. How to use java to develop secure applications is critical. In order to effectively teaching knowledge of java security we have developed a course module titled "java S...
详细信息
ISBN:
(纸本)9781479900534;9781479900527
java is a widely used programming language. How to use java to develop secure applications is critical. In order to effectively teaching knowledge of java security we have developed a course module titled "java Security". This paper presents the content of this module and reports our teaching experiences. This module has been successfully taught in COMP 360 Programming languages class in fall 2012 in the Department of Computer Science at North Carolina A&T State University. Our experience exhibits that teaching this module help students not only understand the java security features, but also gain significant knowledge of safe programming practice. Students' survey and feedback reflected that this module is very valuable in their educational experience. This module could be taught in junior and senior classes of software engineering, computer science and information technology.
Based on the latest international CDIO engineering education concept, the correspondence relationship between the four abilities of the java language teaching target and the CDIO education project idea is analyzed. Th...
详细信息
ISBN:
(纸本)9781467383028
Based on the latest international CDIO engineering education concept, the correspondence relationship between the four abilities of the java language teaching target and the CDIO education project idea is analyzed. The java teaching method based on CDIO engineering education idea is discussed. This teaching method is mainly from the aspects of theoretical teaching, experimental teaching and curriculum assessment to explore the java language teaching mode. In order to improve the quality of teaching, so that students can not only become a programmer with skilled use of java language, but also to improve the quality of a software engineer.
The thermal system of secondary loop in nuclear unit is a concentrated expression of thermal performance of the plant. Calculating and Analysis the thermal system of secondary loop is an important project in the desig...
详细信息
ISBN:
(数字)9789811518768
ISBN:
(纸本)9789811518768;9789811518751
The thermal system of secondary loop in nuclear unit is a concentrated expression of thermal performance of the plant. Calculating and Analysis the thermal system of secondary loop is an important project in the design and operation of nuclear power plant. In this paper, the thermal system of secondary loop in the typical AP1000 unit is studied. For the problem in heat balance method when the parameters in thermal system change, it needs to be detailed quantitative calculation on the whole thermal system, it is tedious and not conducive to the daily use of the operator, the paper base on the Eclipse and java and accomplish the Off-line performance calculating software of the Thermal System of AP1000 Secondary Loop. The software can not only reduce the burden of manual calculation, and intuitively build accurate thermal performance file of units under different conditions and it is the basis of the on-line performance monitoring and fault diagnosis.
e-Science is one of the research hotspots in recent years, which focuses on how to apply IT on other disciplines. How to collect and transmit field data is an immediate problem should be solved in e-Science for those ...
详细信息
ISBN:
(纸本)9781424462520
e-Science is one of the research hotspots in recent years, which focuses on how to apply IT on other disciplines. How to collect and transmit field data is an immediate problem should be solved in e-Science for those disciplines involving field observation. This paper brings out a system for field data collection and transmission in an automatic and high efficient way combined with several kinds of communication methods. A demonstration system has been developed in java language to implement this system and has been verified to be good efficient in test.
Specifications that are used in detailed design and in the documentation of existing code are primarily written and read by programmers. However, most formal specification languages either make heavy use of symbolic m...
详细信息
Specifications that are used in detailed design and in the documentation of existing code are primarily written and read by programmers. However, most formal specification languages either make heavy use of symbolic mathematical operators, which discourages use by programmers, or limit assertions to expressions of the underlying programming language, which makes it difficult to write exact specifications. Moreover, using assertions that are expressions in the underlying programming language can cause problems both in runtime assertion checking and in formal verification, because such expressions can potentially contain side effects. The java Modeling language, JML, avoids these problems. It uses a side-effect free subset of java's expressions to which are added a few mathematical operators (such as the quantifiers \forall and \exists). JML also hides mathematical abstractions, such as sets and sequences, within a library of java classes. The goal is to allow JML to serve as a common notation for both formal verification and runtime assertion checking;this gives users the benefit of several tools without the cost of changing notations. (C) 2004 Elsevier B.V. All rights reserved.
This paper presents the main aspects of the combination of a java implementation of the actor model, called Epidaure, and the java expert system shell JESS, This association of Epidaure with JESS provides a distribute...
详细信息
ISBN:
(纸本)3540664432
This paper presents the main aspects of the combination of a java implementation of the actor model, called Epidaure, and the java expert system shell JESS, This association of Epidaure with JESS provides a distributed computational environment within which each JESS is an active independent computational entity with the ability to communicate freely with other JESS. The paper will go into more detail on the communication mechanism in the Epidaure system and will give a short description on how the association of Epidaura with JESS is used to write DAI applications. The paper will also review some advantages and potential applications and will conclude with new perspectives.
The 11th edition of the Competition on Software Verification (SV-COMP 2022) provides the largest ever overview of tools for software verification. The competition is an annual comparative evaluation of fully automatic...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
The 11th edition of the Competition on Software Verification (SV-COMP 2022) provides the largest ever overview of tools for software verification. The competition is an annual comparative evaluation of fully automatic software verifiers for C and java programs. The objective is to provide an overview of the state of the art in terms of effectiveness and efficiency of software verification, establish standards, provide a platform for exchange to developers of such tools, educate PhD students on reproducibility approaches and benchmarking, and provide computing resources to developers that do not have access to compute clusters. The competition consisted of 15 648 verification tasks for C programs and 586 verification tasks for java programs. Each verification task consisted of a program and a property (reachability, memory safety, overflows, termination). The new category on data-race detection was introduced as demonstration category. SV-COMP 2022 had 47 participating verification systems from 33 teams from 11 countries.
Practical java Debuggers can evaluate expressions at specified break points. Such evaluations may cause extra side effects and make an execution at debugging different from the original one. As a result, java develope...
详细信息
ISBN:
(纸本)9781450362450
Practical java Debuggers can evaluate expressions at specified break points. Such evaluations may cause extra side effects and make an execution at debugging different from the original one. As a result, java developers often have to edit the original source code in order to safely examine runtime values of expressions. In order to cope with this problem, we aim at developing a new feature for a debugger to detect evaluations of an expression by a java virtual machine. This debugging feature doesn't introduce any extra side effects, and will enable java programmers to examine runtime values of an expression by simply specifying it. The implementation of the above feature requires a debugger to make correspondence between bytecode instructions executed by a java Virtual Machine and expressions in java source texts. As the first step toward our goal, we have developed a source code translation method to make this correspondence using LineNumberTable attributes in class files generated by a standard java compiler. There are still several cases that this method fails to automatically determine appropriate correspondence between bytecode instructions and expressions, but its solution has been left as future work. In this paper, we introduce a formalization to this method as a basis of our rigid analysis of failure cases. We evaluate our analysis method by conducting an experimental task to find failure patterns whose template is defined by our formalization.
暂无评论