{"title":"An implementation of self-protected mobile agents","authors":"Joan Ametller, S. Robles, J. A. Ortega-Ruiz","doi":"10.1109/ECBS.2004.1316745","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316745","url":null,"abstract":"Traditional approaches to mobile agent code protection rely on platform-based cryptographic services, often based on PKI solutions. In this paper, we discuss some of their shortcomings, and propose a new architecture for secure mobile agents that addresses two outstanding issues: inter-platform portability and agent code protection. Existing solutions often introduce heavyweight frameworks, requiring a major reengineering of legacy systems and severely impeding portability and code reuse. We show how preexisting, as well as new, agent systems can be robustly secured against a wide variety of external attacks, while minimising the impact on the code base of both the agent and its host platform(s). The paper closes with a discussion of our implementation of the proposed mechanisms, as an extension to the well-known JADE platform.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115297531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal abstract architecture for use case specifications","authors":"O. Ryšavý, F. Bures","doi":"10.1109/ECBS.2004.1316700","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316700","url":null,"abstract":"Originally, use cases were informal modeling artifacts serving for specifying the requirements of computer-based systems in the early development phase. Last decade emphasizes the need for rigorous definition of semantics for use cases since discovering their impact during the whole development process. In this contribution, the semantics of use cases is directly obtained as a consequence of formal representation of use cases in the language of higher-order logic. The definition itself reveals the use case specifications as three level architecture which enables abstract specification of static structure at higher levels and more detailed description of a system's behavior at the lowest level. Often mentioned compactness issue of use cases, the interplay between static views that focus primarily on elicitation possible users of the system and corresponding dynamic views describing abstract behavior of the system is treated separately by adding extra information specifying participants which are, nevertheless, accessible from the whole use case hierarchy.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126870211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A foundation for tool-supported critical systems development with UML","authors":"J. Jürjens, P. Shabalin","doi":"10.1109/ECBS.2004.1316724","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316724","url":null,"abstract":"High quality development of critical systems poses serious challenges. Formal methods have been proposed to address them, but their use in industry is not as wide-spread as originally hoped. We thus propose to use the Unified Modeling Language (UML), the defacto industry standard specification language, as a notation together with a formally based tool-support for critical systems development. We introduce UML machines, which is a formal notation designed to reflect properties of the UML execution semantics relevant to criticality requirements. We use it to define a foundation that puts models for the different diagrams into context and gives a precise meaning to mechanisms such as message-passing between objects or components specified in different diagrams, while offering the possibility to analyze criticality requirements. We present tool-support for this approach developed at the TU Munchen, which facilitates transfer of the methodology to industrial contexts.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128287385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal approach to synthesis of a test controller","authors":"R. Ruzicka, Pavel Tupec","doi":"10.1109/ECBS.2004.1316718","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316718","url":null,"abstract":"In the paper, a method for formal construction of a test controller of the RT level digital circuit is presented. As input, a digital circuit structure at RT level designed using any DfT technique is assumed. The proposed method enables to create a finite state machine with output, which can control all enable, address and clock inputs of circuit elements during the test application process. It is assumed that test patterns are inserted to circuit primary input ports and transferred through the circuit structure to selected points inside the circuit, to which they must be applied. Responses to these test patterns must then be transferred outside of the circuit and analyzed. Transfers of such diagnostic data are controlled by the test controller. Formal tools and approaches are used. The main advantage of formally described methods is that all processes are easily provable and no large evaluation of proposed methods on benchmark circuits is necessary.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"2 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120887308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systems modeling & requirements specification using ECSAM: a method for embedded computer-based systems analysis","authors":"J. Z. Lavi, J. Kudish","doi":"10.1109/ECBS.2004.1316676","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316676","url":null,"abstract":"ECSAM is a requirements engineering and modeling method for computer-based systems (CBS). It is practiced and enhanced since 1980 by large numbers of systems and software engineers. ECSAM was developed in part at Israel Aircraft Industries for the analysis and design of complex reactive embedded systems and software. ECSAM guides the developers in systematic analysis and modeling of systems being developed and describing those using three consistent views; its conceptual architecture, operating modes, and system's capabilities. Each capability is further analyzed and described as a dynamic process. Using ECSAM it is possible to generate systematically the system's use cases and the resulting operational scenarios. The modeling technique is applicable in the analysis of systems and any level of subsystems. The method guides the developer in the derivation of the system requirements and their systematic allocation to and association with the model's elements at the respective levels. ECSAM was the prime motive for the development of the Statecharts technology developed by Prof. David Harel as part of the method. The paper provides an overview of the ECSAM method.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The scheduling algorithms in software architecture modeling","authors":"Jiang Guo, Yuehong Liao","doi":"10.1109/ECBS.2004.1316680","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316680","url":null,"abstract":"A critical issue for complex component-based systems design is the modeling and analysis of architecture. Architectural specifications of software systems show them as a collection of interrelated components, and constitute what has been called the software architecture level of software design. It is at this level where the description and verification of structural properties of the system are naturally addressed. The scheduling algorithms play important roles in the software architecture modeling. These algorithms can be used to model the performance aspects of the software architecture. We have developed a tool - the Web-based software architecture prototyping system (SAPS) - in a distributed environment to meet the requirements of integrating software components into heterogeneous networks. This paper discusses the scheduling algorithms used in the software architecture modeling.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131387873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of object-oriented and other methods for modeling computer based systems","authors":"S. White","doi":"10.1109/ECBS.2004.1316677","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316677","url":null,"abstract":"Methods for modeling computer based systems are evaluated against a common generic model. A formal entity-relationship (ER) model is used to compare the expressive power of methods. Expressive power is important as statements that cannot be expressed in a model is omitted from the analysis and resulting specification. Methods are also analyzed to determine whether they are based on a partial order temporal approach rather than a linear or branching approach. (Partial order is the most powerful of the temporal approaches.) In addition, methods are judged with respect to fifteen method characteristics such as comprehension and support for reuse.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116953802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DVTG and Test Harnessing using Rosetta specifications","authors":"Kalpesh Zinjuwadia, P. Alexander","doi":"10.1109/ECBS.2004.1316692","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316692","url":null,"abstract":"Specification-based verification is increasingly being used when designing systems. In verification, the program under test is executed repeatedly and the obtained outputs and/or other parameters are compared against the expected values. This ensures that the implementation satisfies its specified functionality. We present a tool, DVTG [K. Ranganathan, (2001)], for automatically generating test vectors from Rosetta specifications. DVTG requires test requirements in XML format and test scenarios, to generate these test vectors. For a given set of input parameters, the vectors represent desired output parameter values for the program under test. They can be further translated to specific inputs to run more concrete simulations. Later on, we discuss another tool, Test Harness, to authenticate a test program. We verify the output generated during test harnessing against the acceptance criteria generated from the specifications. We have proposed two major verifications to be performed during test harnessing, verifying the expected behavior and real-time requirements for the test program.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A methodology for requirements engineering process development","authors":"Li Jiang, A. Eberlein, B. Far","doi":"10.1109/ECBS.2004.1316708","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316708","url":null,"abstract":"Adoption of the most suitable requirements engineering (RE) process and selection of the most appropriate RE techniques for a given project is a common challenge faced by industry. This paper presents a methodology for RE process development for a given project. The novelty of this work is four-fold. First, a RE process knowledge base (REPKB) is established and it helps during RE process development. Second, a decision support mechanism is provided during RE process development. Third, this methodology uses three components: process building blocks, standard templates of the RE process and development guidelines, to help process development. Fourth, it explicitly links project characteristics with RE process development so that the most suitable RE process can be developed. The theory behind this methodology is described in the paper. Preliminary results suggest that the methodology is of valuable help to requirements engineers during RE process development and process customization.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theory and applications of evolvable embedded systems","authors":"L. Sekanina, V. Drábek","doi":"10.1109/ECBS.2004.1316698","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316698","url":null,"abstract":"We represent the first attempt to formulate a concept of the evolvable embedded system as a specialized kind of evolvable (hardware) systems. We define the class of evolvable embedded systems, describes a general framework for their modeling, introduces theoretical models, and reviews possible implementations and applications. As a typical example, evolutionary functional recovery of damaged median circuits is considered and simulated.","PeriodicalId":137219,"journal":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}