{"title":"Computational Verification of System Architectures","authors":"A. K. Zaidi, A. Levis","doi":"10.1109/CISDA.2007.368133","DOIUrl":null,"url":null,"abstract":"The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to address the traceability issue between the architectural views, developed in accordance to the DoD architecture framework (DoDAF), and the executable model derived from the framework products. It provides an analytical underpinning of the verification of systems architectures, especially when requirements and capabilities of the systems under consideration evolve over time. The approach is presented with the help of an illustrative example.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISDA.2007.368133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to address the traceability issue between the architectural views, developed in accordance to the DoD architecture framework (DoDAF), and the executable model derived from the framework products. It provides an analytical underpinning of the verification of systems architectures, especially when requirements and capabilities of the systems under consideration evolve over time. The approach is presented with the help of an illustrative example.