In safety critical applications, the growing complexity and risk associated with embedded software intensive systems demands for reliable safety assessments. Additionally, in many application areas standards and norms...
In safety critical applications, the growing complexity and risk associated with embedded software intensive systems demands for reliable safety assessments. Additionally, in many application areas standards and norms require the usage of model based techniques to guarantee the quality of safety critical systems. Model based safety analysis is a formally grounded approach to compute reliable safety properties from system models. In this context the term safety covers functional correctness, failure tolerance, safety optimisation as well as balancing antagonistic safety concerns. The analysis has both qualitative and quantitative aspects. Systems under consideration are discrete reactive systems. An extension also applies to self-organising systems. The talk presents the approach as well as some interesting applications. Wolfgang Reif is a full professor of Computer Science at the University of Augsburg, Germany. He is Dean of the Faculty of Applied Computer Science, Director of the Institute for software & Systems engineering, and Director of the elite graduate program softwareengineering wihtin the Bavarian Elite Network (joint program with TU Muenchen and LMU Muenchen).
In this paper, we present hybrid testing, a method that combines replay-testing (static testing) with automata learning techniques that generate models of black box systems (dynamic testing). This combination helps br...
详细信息
ISBN:
(纸本)9781605580524
In this paper, we present hybrid testing, a method that combines replay-testing (static testing) with automata learning techniques that generate models of black box systems (dynamic testing). This combination helps bridging the gap towards model based testing also for legacy systems. Webtest is an implementation of hybrid testing that builds on top of preexisting technology such as the LearnLib, a framework for automata learning, and the jABC, a framework for modeldriven and service-oriented design, that we use here for modelling, executing, and managing test suites for and models of the web applications under analysis. In particular we intend to move towards Rich Internet Applications (RIAs), that include e.g. advanced client side capabilities and access to heavy resources (e.g. database access) over the Web. Copyright 2008 ACM.
Web-based access to sensitive and confidential data is realized today via different approaches, using a variety of methods to specify and combine access control policies. In an optic of change management and evolution...
详细信息
ISBN:
(纸本)9781605580524
Web-based access to sensitive and confidential data is realized today via different approaches, using a variety of methods to specify and combine access control policies. In an optic of change management and evolution, a structured and flexible model is needed to handle dynamicity, particularly when handling rights in systems with many users which hold different roles. Furthermore the validation of security constraints is an important key to warrant the reliability of control mechanisms. This paper compares the temporal logic-based approach for modeling access control used by the jABC framework with two popular XML-based description languages (XACML and WS-Policy), which are quasi-standards for policy expression in Web applications. Its usage is illustrated here on the example of the web-based Online Conference Service (OCS). The respective functionalities are described and examined in consideration of their ability to validate and enforce the needed policies. Copyright 2008 ACM.
In this paper we show how to apply a tableau-based software composition technique to automatically generate the mediator's service logic. This uses an LTL planning (or configuration) algorithm originally embedded ...
详细信息
In this paper we show how to apply a tableau-based software composition technique to automatically generate the mediator's service logic. This uses an LTL planning (or configuration) algorithm originally embedded in the ABC and in the ETI platforms. The algorithm works on the basis of the existing jABC library of available services (SIB library) and of an enhanced description of their semantics given in terms of a taxonomic classification of their behaviour (modules) and abstract interfaces/messages (types).
Extensibility, flexibility, easy maintainability, and long-term robustness are core requirements for modern, highly distributed information and computation systems. Such systems in turn show a steady increase in compl...
详细信息
In this paper we describe a method for simulation-based verification of microprocessor units based on cycle-accurate contract specifications. Such specifications describe behavior of a unit in the form of precondition...
详细信息
In this paper we describe a method for simulation-based verification of microprocessor units based on cycle-accurate contract specifications. Such specifications describe behavior of a unit in the form of precondition...
详细信息
In this paper we describe a method for simulation-based verification of microprocessor units based on cycle-accurate contract specifications. Such specifications describe behavior of a unit in the form of preconditions and postconditions of microoperations. Test sequence generation is based on traversal of FSM constructed automatically from specifications and test coverage definition. We have successfully applied the method to several units of the industrial MIPS64-compatible microprocessor.
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
In this paper we advocate to introduce a common modelling pattern for all the different layers of middleware based on services. This opens the possibility to flexibly choose the adequate levels for realizing specific ...
详细信息
ISBN:
(纸本)9781595939326
In this paper we advocate to introduce a common modelling pattern for all the different layers of middleware based on services. This opens the possibility to flexibly choose the adequate levels for realizing specific features, and it allows all stakeholders to get a global picture of the overall scenario, a central factor when considering the convergence in networks and applications. Moreover, it allows to apply validations methods like model-based testing and model checking homogeneously, throughout the whole modelling hierarchy, from the underlying converging platforms to the user level. Copyright 2007 ACM.
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology for developing security-critical e-commerce applications. We present an approach to model these applications with the Unified Modeling Language (UML) [1] extended by a UML profile to tailor our models to security applications. Our intent is to (semi-) automatically generate a formal specification suitable for verification as well as an implementation from the model. Therefore we offer a development method seamlessly integrating semi-formal and formal methods as well as the implementation. This is a significant advantage compared to other approaches not dealing with all aspects from abstract models down to code. Based on this approach we can prove security properties on the abstract protocol level as well as the correctness of the protocol implementation in Java with respect to the formal model using the refinement approach. In this paper we concentrate on the modeling with UML and some details regarding the transformation of this model into the formal specification. We illustrate our approach on an electronic payment system called Mondex [10]. Mondex has become famous for being the target of the first ITSEC evaluation of the highest level E6 which requires formal specification and verification.
暂无评论