SEHAS ' 03 International Workshop on Software Engineering for High Assurance Systems

We explore the idea of faking a rational design process, a la Parnas and Clements [7], by the application of the extended SCR Method of Heitmeyer and Bharadwaj. We argue that the formal artefacts created as a result serve as the basis for determining the work products associated with each step of the process, and whose quality assessment is aided by the application of tools in the SCR Toolset. Further, since the products associated with each step have a consistent formal denotation, the approach opens the possibility of significantly automating many process steps.

[1]  Andrew P. Moore,et al.  Trustworthy Refinement Through Intrusion-Aware Design (TRIAD) , 2003 .

[2]  Michael R. Lowry,et al.  Verification and Validation of AI Systems that Control Deep-Space Spacecraft , 1997, ISMIS.

[3]  Maarten Sierhuis,et al.  Management of interdependencies in collaborative software development , 2003, 2003 International Symposium on Empirical Software Engineering, 2003. ISESE 2003. Proceedings..

[4]  C. V. Ramamoorthy,et al.  Performance Evaluation of Asynchronous Concurrent Systems Using Petri Nets , 1980, IEEE Transactions on Software Engineering.

[5]  Sanjai Rayadurgam,et al.  Test-sequence generation from formal requirement models , 2001, Proceedings Sixth IEEE International Symposium on High Assurance Systems Engineering. Special Topic: Impact of Networking.

[6]  Hoyt Lougee,et al.  SOFTWARE CONSIDERATIONS IN AIRBORNE SYSTEMS AND EQUIPMENT CERTIFICATION , 2001 .

[7]  Richard N. Taylor,et al.  A Component- and Message-Based Architectural Style for GUI Software , 1995, 1995 17th International Conference on Software Engineering.

[8]  James I. McManus,et al.  Handbook of Software Quality Assurance , 1987 .

[9]  John Penix,et al.  Verification of time partitioning in the DEOS scheduler kernel , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[10]  Cliff B. Jones,et al.  Systematic software development using VDM , 1986, Prentice Hall International Series in Computer Science.

[11]  J. Michael Spivey,et al.  The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.

[12]  Steve King,et al.  The Value of Verification: Positive Experience of Industrial Proof , 1999, World Congress on Formal Methods.

[13]  David Lorge Parnas,et al.  Requirements-based monitors for real-time systems , 2000, ISSTA '00.

[14]  A. Hilton,et al.  On Applying Software Development Best Practice to FPFAs in Safety Critical Systems , 2000, FPL.

[15]  Dan Craigen,et al.  Experience with formal methods in critical systems , 1994, IEEE Software.

[16]  Editors , 1986, Brain Research Bulletin.

[17]  Anthony Hall,et al.  Seven myths of formal methods , 1990, IEEE Software.

[18]  John McHugh,et al.  A risk driven process model for the development of trusted systems , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[19]  David Lorge Parnas,et al.  A rational design process: How and why to fake it , 1986, IEEE Transactions on Software Engineering.

[20]  John McHugh,et al.  Managing Software Development for Survivable Systems , 2001, Ann. Softw. Eng..

[21]  Daniel Gross,et al.  From Non-Functional Requirements to Design through Patterns , 2001, Requirements Engineering.

[22]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[23]  Nancy G. Leveson,et al.  An investigation of the Therac-25 accidents , 1993, Computer.

[24]  Jon G. Hall,et al.  Mandated Requirements for Hardware / Software Combination in Safety-Critical Systems , 2002 .

[25]  R. Valette,et al.  Fuzzy Petri nets and linear logic , 1993, Proceedings of IEEE Systems Man and Cybernetics Conference - SMC.

[26]  Kurt Jensen,et al.  An Introduction to the Theoretical Aspects of Coloured Petri Nets , 1993, REX School/Symposium.

[27]  Gavin Mooney,et al.  Air vehicle Software Static Code Analysis Lessons Learnt , 2001 .

[28]  Michael R. Lowry,et al.  Formal Analysis of a Space-Craft Controller Using SPIN , 2001, IEEE Trans. Software Eng..

[29]  Peter Amey Logic versus Magic in Critical Systems , 2001, Ada-Europe.

[30]  Ben L. Di Vito High-automation proofs for properties of requirements models , 2000, International Journal on Software Tools for Technology Transfer.

[31]  Bev Littlewood,et al.  Validation of ultrahigh dependability for software-based systems , 1993, CACM.

[32]  Klaus Pohl,et al.  Adapting traceability environments to project-specific needs , 1998, CACM.

[33]  Steve Easterbrook,et al.  Formal methods for verification and validation of partial specifications: A case study , 1998, J. Syst. Softw..

[34]  David Lorge Parnas,et al.  An Invitation to Formal Methods , 1996, Computer.

[35]  Carl K. Chang,et al.  Robust requirements traceability for handling evolutionary and speculative change , 2002 .

[36]  Dieter Hogrefe,et al.  -Autolink- A Tool for the Automatic and Semi-Automatic Test Generation , 1997, FBT.

[37]  Carl K. Chang,et al.  Supporting event based traceability through high-level recognition of change events , 2002, Proceedings 26th Annual International Computer Software and Applications.

[38]  F E O'Neill,et al.  USE OF THE C LANGUAGE IN VEHICLE BASED SOFTWARE , 1998 .

[39]  Peter G. Bishop,et al.  The Practicalities of Goal-Based Safety Regulation , 2001 .

[40]  Jonathan P. Bowen,et al.  Seven More Myths of Formal Methods , 1994, FME.

[41]  Anthony Hall Using Formal Methods to Develop an ATC Information System , 1996, IEEE Softw..

[42]  P. Kidwell,et al.  The mythical man-month: Essays on software engineering , 1996, IEEE Annals of the History of Computing.

[43]  Angelo Gargantini,et al.  Using model checking to generate tests from requirements specifications , 1999, ESEC/FSE-7.

[44]  Wil M.P. van der Aalst,et al.  Putting Petri nets to work in Industry , 2002 .

[45]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[46]  Frank Waters,et al.  The B Book , 1971 .

[47]  Ashish Tiwari,et al.  Invisible formal methods for embedded control systems , 2003, Proc. IEEE.

[48]  H. Penny Nii,et al.  Blackboard systems: the blackboard model of problem solving and the evolution of blackboard architectures , 1995 .

[49]  David S. Rosenblum,et al.  Merging component models and architectural styles , 1998, ISAW '98.

[50]  Peter Neumann,et al.  Safeware: System Safety and Computers , 1995, SOEN.

[51]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[52]  Nick Roussopoulos,et al.  Timing Requirements for Time-Driven Systems Using Augmented Petri Nets , 1983, IEEE Transactions on Software Engineering.

[53]  蔡進發,et al.  Monitoring and Debugging Distributed Real-Time Systems , 1993 .

[54]  Xavier Franch,et al.  Putting non-functional requirements into software architecture , 1998, Proceedings Ninth International Workshop on Software Specification and Design.

[55]  Dino Mandrioli,et al.  From formal models to formally based methods: an industrial experience , 1999, TSEM.

[56]  Edsger W. Dijkstra,et al.  A Discipline of Programming , 1976 .

[57]  Mary Shaw,et al.  Software architecture - perspectives on an emerging discipline , 1996 .

[58]  Sung Deok Cha,et al.  Safety analysis using coloured Petri nets , 1996, Proceedings 1996 Asia-Pacific Software Engineering Conference.

[59]  John McHugh,et al.  Life-Cycle Models for Survivable Systems , 2002 .

[60]  W. Royce Managing the development of large software systems: concepts and techniques , 2021, ICSE '87.

[61]  John Penix,et al.  Formal Analysis of the Remote Agent Before and After Flight , 2000 .

[62]  Gerard J. Holzmann,et al.  Validating requirements for fault tolerant systems using model checking , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.

[63]  David Lorge Parnas,et al.  Review of David L. Parnas' "Designing Software for Ease of Extension and Contraction" , 2004 .

[64]  Andrew Taylor,et al.  IT projects: sink or swim , 2000 .

[65]  P. Merlin,et al.  Recoverability of Communication Protocols - Implications of a Theoretical Study , 1976, IEEE Transactions on Communications.

[66]  Harald Ruess,et al.  Lazy Theorem Proving for Bounded Model Checking over Infinite Domains , 2002, CADE.