Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.最新文献

筛选
英文 中文
Maintaining abstractions with verification 用验证维护抽象
W. Hunt, W. D. Young
{"title":"Maintaining abstractions with verification","authors":"W. Hunt, W. D. Young","doi":"10.1109/CMPASS.1990.175408","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175408","url":null,"abstract":"By use of the Boyer-Moore logic a microprocessor, an assembler and a compiler have been formally specified. Each of these provides a more abstract interface than that upon which they are implemented (e.g., the language of the compiler is more abstract than the language of the assembler that is the target of the compiler). In a simple prototype system, it is shown that it is possible to ensure that such abstractions are correctly maintained by verifying the correct implementation of the systems which support them. Because the components of the prototype system were designed as cooperating units, the abstractions supported can be composed to provide an environment for developing software systems for which the predictability of the high-level language programs is just as good as that of the Boolean logic hardware model.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time software failure characterization 实时软件故障表征
J. Dunham, G. B. Finelli
{"title":"Real-time software failure characterization","authors":"J. Dunham, G. B. Finelli","doi":"10.1109/CMPASS.1990.175400","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175400","url":null,"abstract":"An overview of a series of studies aimed at characterizing the fundamentals of the software failure process is presented. The focus is on the development of three independent implementations of an aerospace guidance and control software (GCS) application. The study addresses three objectives related to the development of a credible software reliability assessment methodology: description, development method effectiveness, and fundamentals. Previous studies have provided insight about the software failure process. Different faults were found to produce errors at widely varying rates. Program error rates were found to follow a log-linear trend with respect to the number of faults corrected. Some of the faults were found to interact with each other in concealing and revealing ways. Points in the input space that cause a fault to produce errors can tend to cluster and form regions called error crystals.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123779182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A formal approach to railway signalling 铁路信号的正式方法
W. J. Cullyer, W. Wong
{"title":"A formal approach to railway signalling","authors":"W. J. Cullyer, W. Wong","doi":"10.1109/CMPASS.1990.175406","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175406","url":null,"abstract":"A mathematical model of the railway signaling rules used in the United Kingdom is presented as an example of the application of formal methods to the design of high-integrity computer equipment. A theory which can be used to specify a general railway network and the proving of the safety of routes within that network has been constructed by use of higher order logic (HOL). The HOL system and the railway signaling model are reviewed. Representation of rail networks and route finding and proving are discussed.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An analysis of ordnance software using the MALPAS tools 使用MALPAS工具对军械软件进行分析
K. Hayman
{"title":"An analysis of ordnance software using the MALPAS tools","authors":"K. Hayman","doi":"10.1109/CMPASS.1990.175404","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175404","url":null,"abstract":"Results of using the MALPAS static analysis package are presented, both as they relate to the specific software being analyzed and more generally in terms of the experience and insight gained into the application of static analysis techniques to the verification of real-time software. The translation of the software into the intermediate language used by the MALPAS analyzers, the results of code analysis, the answers to questions posed about the software, and the conclusions arising from the analysis are discussed. Two significant safety-related flaws were detected during the analysis, one in the software itself and the other in the specification of the device. Comparisons are made between the findings of the analysis and currently proposed standards for writing safety-critical software.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of trusted systems evaluation criteria 可信系统评估标准的比较
C. Pfleeger
{"title":"Comparison of trusted systems evaluation criteria","authors":"C. Pfleeger","doi":"10.1109/CMPASS.1990.175410","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175410","url":null,"abstract":"A comparison of the trusted computer system evaluation criteria (TCSEC) and methodologies of four countries, the United States, Canada, Germany, and Britain, is presented. The evaluation criteria and methodologies of each country are described, and the four national approaches are compared. The US criteria apply to operating systems supporting a confidentiality security policy. The Canadian criteria extend the US TCSEC with criteria for integrity and availability, as well as for accountability and assurance. The German criteria are patterned closely on the US criteria, with the major exceptions that features and assurances are rated separately. With the British criteria, a developer states certain claims about a product's functionality, and the claims are independently evaluated for a chosen level of assurance.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Uncovering redundancy and rule-inconsistency in knowledge bases via deduction 通过演绎发现知识库中的冗余和规则不一致
J. McGuire
{"title":"Uncovering redundancy and rule-inconsistency in knowledge bases via deduction","authors":"J. McGuire","doi":"10.1109/CMPASS.1990.175402","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175402","url":null,"abstract":"Two examples of dangerous rule interactions-redundancy and rule inconsistency-are reviewed. Their implementation is described in the context of the Defense Advanced Research Projects Agency (DARPA) Expert-System Validation Associate (DEVA). Emphasis has been placed on devising strategies that can be used on atypical knowledge bases, i.e., those containing an especially hostile search space. A hostile search space is one which is very bushy and/or contains possibly many cycles in the rules. Techniques for detecting redundancy and rule-inconsistency anomalies in the absence of facts are discussed. Two approaches are considered: the restricted generate-and-test approach and residue analysis.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114535129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Fast static analysis of real-time rule-based systems to verify their fixed point convergence 基于规则的实时系统快速静态分析,验证其不动点收敛性
A. Cheng, C.-K. Wang
{"title":"Fast static analysis of real-time rule-based systems to verify their fixed point convergence","authors":"A. Cheng, C.-K. Wang","doi":"10.1109/CMPASS.1990.175401","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175401","url":null,"abstract":"A class of real-time rule-based decision systems in which decisions are computed by an equational rule-based (EQL) program is described. The timing analysis of interest is to verify that a real-time EQL program converges to stable values in bounded time at each invocation. Techniques for determining whether an EQL rule-based program is guaranteed to converge to stable values in bounded time are presented. An approach that is based on static analysis of the rules of the EQL program and that does not require generating a reachability graph is discussed. The approach is utilized to perform a pre-run-time analysis on two real expert system programs, the Integrated Status Assessment Expert System (ISA) and the Fuel Cell Monitoring Expert System (FCE), to verify whether the variables in these programs will always converge to stable values in bounded time at each invocation.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
DRIVE-ing standards: a safety critical matter 驾驶标准:一个安全的关键问题
T. F. Buckley, P. Jesty, K. Hobley, M. West
{"title":"DRIVE-ing standards: a safety critical matter","authors":"T. F. Buckley, P. Jesty, K. Hobley, M. West","doi":"10.1109/CMPASS.1990.175413","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175413","url":null,"abstract":"The movement toward common standards for the application of information technology to European road transport systems is discussed. In particular, the Commission of the European Communities project V1051, Procedure for Safety Submissions for Road Transport Informatics, in the DRIVE program and the relevance of a series of recently released draft standards for safety-related software are considered. These include software development standards and those applying to the safety life cycle model.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"67 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The rigorous specification and verification of the safety aspects of a real-time system 对实时系统安全方面的严格规范和验证
D. Mannering, B. Cohen
{"title":"The rigorous specification and verification of the safety aspects of a real-time system","authors":"D. Mannering, B. Cohen","doi":"10.1109/CMPASS.1990.175403","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175403","url":null,"abstract":"Three main concepts concerning safety and the use of formal specification and rule techniques are described. They are safety analysis leading to a list of safety requirements, deriving a formal specification from a list of safety requirements, and formally proving that an implementation satisfies its specification. All three must be covered satisfactorily before a system can be considered safe. It is shown how these techniques have been used in the verification of the implementation of a sophisticated torpedo system containing onboard computing for target acquisition and approach. The specification of the most safety-critical features is written in an object-oriented process specification format which is a variant of the Z notation. The MALPAS static analysis tool is introduced and used to verify that the functionality of the implementation of the safety features formally satisfies its specification and hence safety requirements. Verifying the MALPAS-logic-derived specification against the original implementation indicated that a problem existed in the hardware check section of the design. As a result the implementation was modified.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Should government regulate medical software? 政府应该监管医疗软件吗?
R. Britain, J. Paul
{"title":"Should government regulate medical software?","authors":"R. Britain, J. Paul","doi":"10.1109/CMPASS.1990.175420","DOIUrl":"https://doi.org/10.1109/CMPASS.1990.175420","url":null,"abstract":"The role of the US Food and Drug Administration in regulating the software of computer-controlled medical devices is addressed. The FDA draft software review guide's focus on regulating software aspects rather than system aspects, the licensing of manufacturers or individuals engaged in the software development and the effects of regulation of medical software development on small medical manufacturers and start-ups are discussed.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125391615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信