Search Results - "Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance"

Refine Results
  1. 1

    Using formal methods to derive test frames in category-partition testing by Ammann, P., Offutt, J.

    “…Testing is a standard method of assuring that software performs as intended. We extend the category-partition method, which is a specification-based testing…”
    Get full text
    Conference Proceeding
  2. 2

    Covert channels-here to stay? by Moskowitz, I.S., Kang, M.H.

    “…We discuss the difficulties of satisfying high-assurance system requirements without sacrificing system capabilities. To alleviate this problem, we show how…”
    Get full text
    Conference Proceeding
  3. 3

    A development of hazard analysis to aid software design by McDermid, J.A., Pumfrey, D.J.

    “…This paper describes a technique for software safety analysis which has been developed with the specific aim of feeding into and guiding design development…”
    Get full text
    Conference Proceeding
  4. 4

    Formal verification of an interactive consistency algorithm for the Draper FTP architecture under a hybrid fault model by Lincoln, P., Rushby, J.

    “…Fault-tolerant systems for critical applications should tolerate as many kinds of faults and as large a number of faults as possible, while using as little…”
    Get full text
    Conference Proceeding
  5. 5

    Estimation of coverage probabilities for dependability validation of fault-tolerant computing systems by Constantinescu, C.

    “…Dependability validation is a major step toward development of high-assurance computing systems. This paper addresses the problem of estimating the coverage…”
    Get full text
    Conference Proceeding
  6. 6

    Experiences formally verifying a network component by Curzon, P.

    “…Errors in network components can have disastrous effects so it is important that all aspects of the design are correct. We describe our experiences formally…”
    Get full text
    Conference Proceeding
  7. 7

    A formal model of several fundamental VHDL concepts by Goldschlag, D.M.

    “…This paper presents a formal model of several fundamental concepts in VHDL including the semantics of individual concurrent statements, and groups of those…”
    Get full text
    Conference Proceeding
  8. 8

    Evaluating software for safety systems in nuclear power plants by Lawrence, J.D., Persons, W.L., Preckshot, G.G., Gallagher, J.

    “…This paper presents the results of work performed by Lawrence Livermore National Laboratory to assist the U.S. Nuclear Regulatory Commission in understanding…”
    Get full text
    Conference Proceeding
  9. 9

    On measurement of operational security [software reliability] by Brocklehurst, S., Littlewood, B., Olovsson, T., Jonsson, E.

    “…Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of 'the ability of the system to resist attack'. That is, it…”
    Get full text
    Conference Proceeding
  10. 10

    State minimization for concurrent system analysis based on state space exploration by Kang, I., Lee, I.

    “…A fundamental issue in the automated analysis of concurrent systems is the efficient generation of the reachable state space. Since it is not possible to…”
    Get full text
    Conference Proceeding
  11. 11

    Testability, failure rates, detectability, trustability and reliability by Howden, W.E.

    “…Discusses the relationship between several statistical measures of program dependability, including failure rates and testability. This is done by describing…”
    Get full text
    Conference Proceeding
  12. 12

    Causality as a means for the expression of requirements for safety critical systems by Coombes, A., McDermid, J., Morris, P.

    “…The development of requirements for software systems has long been identified as an important and difficult part of software development. This is much more so…”
    Get full text
    Conference Proceeding
  13. 13

    Testability: an introduction for COMPASS94 by Miller, K.W.

    “…Testability is the probability that software will fail during random testing if it contains a fault. Reliability and correctness are distinct from testability,…”
    Get full text
    Conference Proceeding
  14. 14

    Application of an informal program verification method to Ada by Wieand, B., Howden, W.E.

    “…The QDA informal program verifcation method is a comments analysis technique in which an analyst's assumptions about a program are expressed in the form of…”
    Get full text
    Conference Proceeding
  15. 15

    Formal methods and dependability assessment by Stavridou, V., Liu, S., Dutertre, B.

    “…Formal methods are increasingly used for system development and their potential advantages for dependability assurance have been recognized. However, there has…”
    Get full text
    Conference Proceeding
  16. 16

    Case study: Applying formal methods to the Traffic Alert and Collision Avoidance System (TCAS) II by Britt, J.J.

    “…Requirements State Machine Language (RSML) evolved from statecharts during the development of the Traffic Alert and Collision Avoidance System (TCAS) II system…”
    Get full text
    Conference Proceeding
  17. 17

    Testability, testing, and critical software assessment by Voas, J.M.

    “…Although the phrases "critical system" and "critical software" encompass different degrees of "criticality" based on the user and application, I consider…”
    Get full text
    Conference Proceeding
  18. 18

    AeSOP: an interactive failure mode analysis tool by Cha, S.S.

    “…AeSOP (Aerospace Safety Oriented Petri Net) is an interactive failure mode analysis tool developed at The Aerospace Corporation. It automates a Petri net-based…”
    Get full text
    Conference Proceeding
  19. 19

    An ounce of prevention is worth a pound of cure. Towards physically-correct specifications of embedded real-time systems by Bestavros, A.

    “…Predictability-the ability to foretell that an implementation will not violate a set of specified reliability and timeliness requirements-is a crucial, highly…”
    Get full text
    Conference Proceeding
  20. 20

    Experience applying the CoRE method to the Lockheed C-130J software requirements by Faulk, S., Finneran, L., Kirby, J., Shah, S., Sutton, J.

    “…For safety-critical systems, regulatory and human concerns make assurance of requirements correctness a necessity. Most popular requirements methods rely…”
    Get full text
    Conference Proceeding