{"title":"系统架构的计算验证","authors":"A. K. Zaidi, A. Levis","doi":"10.1109/CISDA.2007.368133","DOIUrl":null,"url":null,"abstract":"The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to address the traceability issue between the architectural views, developed in accordance to the DoD architecture framework (DoDAF), and the executable model derived from the framework products. It provides an analytical underpinning of the verification of systems architectures, especially when requirements and capabilities of the systems under consideration evolve over time. The approach is presented with the help of an illustrative example.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Computational Verification of System Architectures\",\"authors\":\"A. K. Zaidi, A. Levis\",\"doi\":\"10.1109/CISDA.2007.368133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to address the traceability issue between the architectural views, developed in accordance to the DoD architecture framework (DoDAF), and the executable model derived from the framework products. It provides an analytical underpinning of the verification of systems architectures, especially when requirements and capabilities of the systems under consideration evolve over time. The approach is presented with the help of an illustrative example.\",\"PeriodicalId\":403553,\"journal\":{\"name\":\"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISDA.2007.368133\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISDA.2007.368133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computational Verification of System Architectures
The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to address the traceability issue between the architectural views, developed in accordance to the DoD architecture framework (DoDAF), and the executable model derived from the framework products. It provides an analytical underpinning of the verification of systems architectures, especially when requirements and capabilities of the systems under consideration evolve over time. The approach is presented with the help of an illustrative example.