By Topic

Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000)

17-17 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 47
  • Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 331
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Analysis of group communication protocols to assess quality of service properties

    Publication Year: 2000, Page(s):247 - 256
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    Focuses on a QoS analysis carried out through analytical modelling and experimental evaluation. QoS is defined as a set of qualitative and quantitative characteristics of a (sub)system, which are necessary for obtaining the required functionality of an application. Its analysis is a necessary step for the early verification and validation of an appropriate design, and for taking design decisions a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered framework strategy for deploying high assurance VPNs

    Publication Year: 2000, Page(s):199 - 202
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Deploying VPNs (Virtual Private Networks), especially in a large-scale environment, requires much planning. Based on actual implementation experience, we propose a layered framework that can be used to distribute VPN deliverables among different workgroups. Despite the perception that a VPN is not a customizable solution, we conclude there is a broad range of VPN options available with correspondi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling with extended fault trees

    Publication Year: 2000, Page(s):238 - 246
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    In the areas of both safety and reliability analysis, the precise modeling of complex technical systems during their development and for evaluation purposes is of great importance. Traditionally, fault tree models have been used to accomplish this, and, more recently, stochastic Petri-net models have begun to be employed. To provide engineers with an intuitive high-level modeling interface to Petr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing guaranteed assurance to connection-oriented group communications using disjoint routing

    Publication Year: 2000, Page(s):197 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We compare different approaches which provide guaranteed assurance to connection-oriented group communications based on the use of working and backup disjoint route sets. Specifically, we present experimental results showing the effect of disjoint backup route sets on mesh/tree/ring feasibility and cost View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety validation of embedded control software using Z animation

    Publication Year: 2000, Page(s):228 - 237
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Describes a rigorous approach to safety validation of embedded control software by specification animation. The software control logic is specified in Z and systematically animated together with a model of the equipment under control. All reachable equipment states under software control are systematically identified and compared with known hazardous states in normal operation and under dominant f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The experience of auditing software for safety critical railway signalling equipment

    Publication Year: 2000, Page(s):193 - 196
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    The experience of carrying out Audit of two versions of Software for a Railway Signalling equipment, called the “Universal Fail Safe Block Interface” (UFSBI), being developed by two vendors is described. For the users and the developers, this had been the first exposure to formal development of safety critical software. The auditors were academics with IV&V experience for only aero... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of formal methods in hardware and software cannot be abandoned

    Publication Year: 2000, Page(s):142 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    The title of this paper provides an answer to the question posed by Larry King in his panel paper titled "Do formal methods really belong in the toolbox of the practicing engineer?" Yes, formal methods do indeed belong to the toolbox of the practicing engineer. The capabilities of today's computers are truly impressive and as a result have opened door to the design and development of increasingly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured language for specifications of quantitative requirements

    Publication Year: 2000, Page(s):221 - 227
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Requirements for dependable systems need to be understandable and, at the same time, have to satisfy consistency and non-ambiguity properties. We provide a means to specify nonfunctional requirements in terms of structured English sentences. We define their syntax by a clear and consistent notation. For verification, these sentences have to be transformed into a notation that can be interpreted by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing convincing evidence of safety in X-by-wire automotive systems

    Publication Year: 2000, Page(s):189 - 192
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A new generation of automotive systems, such as brake-, steer-, throttle-by-wire, and combinations of these by-wire systems, offer the promise of improved vehicle performance and safety. However, these by-wire systems represent a major technology change, and as a result, merit higher levels of analysis, design, and verification. Like other safety-critical systems, the case for safety should be car... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the B formal method to the proof of a type verification algorithm

    Publication Year: 2000, Page(s):115 - 124
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Smart cards are credit-card sized devices embedding a microprocessor. They are typically used to provide security to an information system. Open cards are smart cards able to download code after their issuance. The card security is usually ensured by a third party that sends a cryptographic certificate with the code to authenticate it. On-card code verification could be a solution for improving ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On how symposia can be structured to benefit academia and industry*

    Publication Year: 2000, Page(s):51 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assurance system architecture for information service by utilizing autonomous mobile agents

    Publication Year: 2000, Page(s):273 - 280
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    An information service system must be designed such that service providers (SPs) and users can supply and use the information service in a timely and reliable way, while each of the SPs has their own mission and each of the users has their own service preferences. Moreover, the mission and the user preferences change dynamically. As the network becomes larger, it may include the failure, maintenan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable software construction: a logic programming based methodology

    Publication Year: 2000, Page(s):140 - 141
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    In this position paper we investigate how logic programming technology can aid software development. The overall goal is to provide a framework for specification and verification that is “computational” in nature rather than being based on traditional, more complex formalisms such as theorem proving and term rewriting. Two approaches are discussed. In the first approach, given a progra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First principles applied to software safety - the novel use of silicon machinery

    Publication Year: 2000, Page(s):216 - 218
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Presents a methodology that may provide a radical new way of assuring the safety of software-based systems through a novel application of first principles enabled by micro-electromechanical systems (MEMS) technology, i.e. silicon machinery. `First principles' is defined as theory that is defensible through fundamental laws of nature in the chemical, physical or mechanical structure of materials or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The synthesis of real-time systems from processing graphs

    Publication Year: 2000, Page(s):177 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    Directed graphs, called processing graphs, are a standard design aid for complex real-time systems. The primary problem in developing real-time systems with processing graphs is transforming the processing graph into a predictable real-time system in which latency can be managed. Software engineering techniques are combined with real-time scheduling theory to solve this problem. In the parlance of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded system for safe, secure and reliable execution of high consequence software

    Publication Year: 2000, Page(s):107 - 114
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an ultra-reliable execution environment. The selection of an embedded processor and its development environment has the most far-reaching effects on the production of the system than any other element in the design. This choice ripples through the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Four areas of overlapping interest

    Publication Year: 2000, Page(s):49 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-assurance measurement repository system

    Publication Year: 2000, Page(s):265 - 272
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    High-quality measurement data are very useful for assessing the efficacy of high-assurance system engineering techniques and tools. Given the rapidly evolving suite of modern tools and techniques, it is helpful to have a large repository of up-to-date measurement data that can be used to quantitatively assess the impact of state-of-the-art techniques on the quality of the resulting systems. For ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do formal methods really belong in the toolbox of the practicing engineer?

    Publication Year: 2000, Page(s):137 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GSU middleware architecture design

    Publication Year: 2000, Page(s):212 - 215
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    NASA's future deep-space missions will require onboard software upgrade. A challenge that arises from this is that of guarding the system against performance loss caused by residual design faults in the new version of a spacecraft/science function. Accordingly, we have developed a methodology called guarded software upgrading (GSU). The GSU framework is based on the Baseline X2000 First Delivery A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements formalization and validation for a telecommunication equipment protection switcher

    Publication Year: 2000, Page(s):169 - 176
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Using formal methods, namely model checking, we can automatically verify a formal model of the requirements against given properties. This allows us to detect errors early in the design process, thus decreasing development cost and time to market. However, to modify a well established design process to introduce formal methods is not easy. We present a case study exploring the possibility of repla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The DADSim air defense simulation environment

    Publication Year: 2000, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    DADSim is a distributed air defense simulation environment, being made compliant with the High Level Architecture (HLA) (http://www.hla.dmso.mil) runtime, a distributed environment used for defense simulations. DADSim simulates modern day combat dynamics of air defense engagements involving multiple targets and multiple platforms enforced using a multi-tier command and control structure. DADSim co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible real-time architecture

    Publication Year: 2000, Page(s):99 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Assuring hard real-time characteristics of I/O associated with embedded software is often a difficult task. Input-Output related statements are often intermixed with the computational code, resulting in I/O timing that is dependent on the execution path and computational load. One way to mitigate this problem is through the use of interrupts. However, the non-determinism that is introduced by inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.