Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance最新文献

筛选
英文 中文
An experience modeling critical requirements 对关键需求建模的经验
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318448
C. Payne, A. Moore, D. Mihelcic
{"title":"An experience modeling critical requirements","authors":"C. Payne, A. Moore, D. Mihelcic","doi":"10.1109/CMPASS.1994.318448","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318448","url":null,"abstract":"Previous work at NRL demonstrated the benefits of a security modeling approach for building high assurance systems for particular application domains. This paper introduces an application domain called selective bypass that is prominent in certain network security solutions. We present a parameterized modeling framework for the domain and then instantiate a confidentiality model for a particular application, called the External COMSEC Adaptor (ECA), within the framework. We conclude with lessons we learned from modeling, implementing and verifying the ECA. Our experience supports the use of the application-based security modeling approach for high assurance systems.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Case study: Applying formal methods to the Traffic Alert and Collision Avoidance System (TCAS) II 案例研究:将形式化方法应用于交通警报和避碰系统(TCAS) II
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318468
J. Britt
{"title":"Case study: Applying formal methods to the Traffic Alert and Collision Avoidance System (TCAS) II","authors":"J. Britt","doi":"10.1109/CMPASS.1994.318468","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318468","url":null,"abstract":"Requirements State Machine Language (RSML) evolved from statecharts during the development of the Traffic Alert and Collision Avoidance System (TCAS) II system requirements specification. This paper describes RSML and the TCAS II system requirements specification, which was reverse-engineered from pseudocode. This case study illustrates how formal methods have been applied to a safety-critical system, improving the assurance of safety in three areas: product review, process and personnel certification, and functional testing.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Formal methods and dependability assessment 正式方法和可靠性评估
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318467
V. Stavridou, S. Liu, B. Dutertre
{"title":"Formal methods and dependability assessment","authors":"V. Stavridou, S. Liu, B. Dutertre","doi":"10.1109/CMPASS.1994.318467","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318467","url":null,"abstract":"Formal methods are increasingly used for system development and their potential advantages for dependability assurance have been recognized. However, there has so far been no hard evidence to either support or refute the efficacy of formal methods in this respect. This paper discusses how the dependability of systems can be affected by the tree of formal methods in two respects. First, how and why formal methods can help ensure the dependability of systems, and second what uncertainties can affect their effectiveness in achieving dependability. Issues related to the assessment of formal methods such as assessment criteria an assessment model and the establishment of evaluation experiments are discussed.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A formal model of several fundamental VHDL concepts 几个基本VHDL概念的形式化模型
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318454
D. Goldschlag
{"title":"A formal model of several fundamental VHDL concepts","authors":"D. Goldschlag","doi":"10.1109/CMPASS.1994.318454","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318454","url":null,"abstract":"This paper presents a formal model of several fundamental concepts in VHDL including the semantics of individual concurrent statements, and groups of those statements, resolution functions, delta delays, and hierarchical component structuring. Based on this model, several extensions to VHDL are proposed including nondeterministic assignments and unbounded asynchrony. Nondeterminism allows the specification of environments and of classes of devices. This model naturally captures the meaning of composition of VHDL programs.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"7 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimation of coverage probabilities for dependability validation of fault-tolerant computing systems 容错计算系统可靠性验证的覆盖概率估计
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318463
C. Constantinescu
{"title":"Estimation of coverage probabilities for dependability validation of fault-tolerant computing systems","authors":"C. Constantinescu","doi":"10.1109/CMPASS.1994.318463","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318463","url":null,"abstract":"Dependability validation is a major step toward development of high-assurance computing systems. This paper addresses the problem of estimating the coverage probabilities by statistically processing the information collected through physical or simulated fault injection. 3-stage random sampling is employed to derive the means, variances and confidence intervals of the coverage probabilities. The statistical experiments are carried out in a 3D fault space that accounts for system inputs, fault injection times and fault locations. In the case of real-time systems, the inputs and the injection times also provide useful information about the workload to be executed. The proposed solution technique is tested against the data generated by a program that mimics a fault environment. Two application examples are considered. Several working rules for designing 3-stage random sampling experiments are also provided.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"122 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
State minimization for concurrent system analysis based on state space exploration 基于状态空间探索的并行系统分析的状态最小化
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318461
Inhye Kang, Insup Lee
{"title":"State minimization for concurrent system analysis based on state space exploration","authors":"Inhye Kang, Insup Lee","doi":"10.1109/CMPASS.1994.318461","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318461","url":null,"abstract":"A fundamental issue in the automated analysis of concurrent systems is the efficient generation of the reachable state space. Since it is not possible to explore all the reachable states of a system if the number of states is very large or infinite, we need to develop techniques for minimizing the state space. This paper presents our approach to cluster subsets of states into equivalent classes. We assume that concurrent systems are specified as communicating state machines with arbitrary data space. We describe a procedure for constructing a minimal reachability state graph from communicating state machines. As an illustration of our approach, we analyze a producer-consumer program written in Ada.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Formal methods in the design of Ada 9X Ada 9X设计中的形式化方法
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318469
D. Guaspari
{"title":"Formal methods in the design of Ada 9X","authors":"D. Guaspari","doi":"10.1109/CMPASS.1994.318469","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318469","url":null,"abstract":"Several advisory groups have been established to provide suggestions and criticism to the Ada 9X Mapping Revision Team, the small design team that is revising the definition of the Ada programming language. One such group, the Language Precision Team, based its criticisms on attempts to construct formal mathematical models of the design. This paper reports on the first phase of that work.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A development of hazard analysis to aid software design 危害分析的发展,以帮助软件设计
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318470
J. Mcdermid, D. Pumfrey
{"title":"A development of hazard analysis to aid software design","authors":"J. Mcdermid, D. Pumfrey","doi":"10.1109/CMPASS.1994.318470","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318470","url":null,"abstract":"This paper describes a technique for software safety analysis which has been developed with the specific aim of feeding into and guiding design development. The method draws on techniques from the chemical industries' Hazard and Operability (HAZOP) analysis, combining this with work on software failure classification to provide a structured approach to identifying the hazardous failure modes of new software.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130395544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Experience applying the CoRE method to the Lockheed C-130J software requirements 具有将CoRE方法应用于洛克希德C-130J软件需求的经验
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318472
S. Faulk, L. Finneran, J. Kirby, S. Shah, J. Sutton
{"title":"Experience applying the CoRE method to the Lockheed C-130J software requirements","authors":"S. Faulk, L. Finneran, J. Kirby, S. Shah, J. Sutton","doi":"10.1109/CMPASS.1994.318472","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318472","url":null,"abstract":"For safety-critical systems, regulatory and human concerns make assurance of requirements correctness a necessity. Most popular requirements methods rely heavily on expensive after-the-fact verification, validation and correction activities to attain a desired level of correctness. In cooperation with its industrial partners, the Software Productivity Consortium (the Consortium) has developed a rigorous requirements engineering method called CoRE (\"Consortium Requirements Engineering\"), building upon proven formal and object-oriented methods. As part of Continuous Process Improvement (CPI), Lockheed Aeronautical Systems Company (LASC) has incorporated CoRE into its C-130J aircraft program, to develop avionics system requirements. C-130J is a safety critical application. The results have verified the method's practicality and effectiveness at \"building in\" correctness during requirements analysis. They have further demonstrated that the benefits of a rigorous approach can be had without adversely affecting cost or schedule.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
On measurement of operational security [software reliability] 关于操作安全性的测量[软件可靠性]
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318447
S. Brocklehurst, B. Littlewood, T. Olovsson, E. Jonsson
{"title":"On measurement of operational security [software reliability]","authors":"S. Brocklehurst, B. Littlewood, T. Olovsson, E. Jonsson","doi":"10.1109/CMPASS.1994.318447","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318447","url":null,"abstract":"Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of 'the ability of the system to resist attack'. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit 'more secure behaviour' in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of 'operational security' similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf. rate of occurrence of failures in reliability), or the probability that a specified 'mission' can be accomplished without a security breach (cf. reliability function). This new approach is based on the analogy between system failure and security breach, but it raises several issues which invite empirical investigation. We briefly describe a pilot experiment that we have conducted to judge the feasibility of collecting data to examine these issues.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信