Certifications of Critical Systems – The CECRIS Experience

Certifications of Critical Systems – The CECRIS Experience
Author: Andrea Bondavalli
Publisher: CRC Press
Total Pages: 197
Release: 2022-09-01
Genre: Computers
ISBN: 1000792145

In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.

Computer Safety, Reliability, and Security

Computer Safety, Reliability, and Security
Author: Alexander Romanovsky
Publisher: Springer Nature
Total Pages: 425
Release: 2019-09-02
Genre: Computers
ISBN: 3030262502

This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2019, 38th International Conference on Computer Safety, Reliability and Security, in September 2019 in Turku, Finland. The 32 regular papers included in this volume were carefully reviewed and selected from 43 submissions; the book also contains two invited papers. The workshops included in this volume are: ASSURE 2019: 7th International Workshop on Assurance Cases for Software-Intensive Systems DECSoS 2019: 14th ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2019: 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems STRIVE 2019: Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms WAISE 2019: Second International Workshop on Artificial Intelligence Safety Engineering

Model-Driven Engineering and Software Development

Model-Driven Engineering and Software Development
Author: Philippe Desfray
Publisher: Springer
Total Pages: 447
Release: 2016-01-04
Genre: Computers
ISBN: 331927869X

This book constitutes thoroughly revised and selected papers from the Third International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2015, held in Angers, France, in February 2015. The 25 thoroughly revised and extended papers presented in this volume were carefully reviewed and selected from 94 submissions. They are organized in topical sections named: invited papers; modeling languages, tools and architectures; methodologies, processes and platforms; applications and software development.

Resilience Assessment and Evaluation of Computing Systems

Resilience Assessment and Evaluation of Computing Systems
Author: Katinka Wolter
Publisher: Springer Science & Business Media
Total Pages: 485
Release: 2012-11-02
Genre: Computers
ISBN: 3642290329

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of our daily life depend on the correct, reliable and secure operation of often large-scale distributed computing systems. Wolter and her co-editors grouped the 20 chapters from leading researchers into seven parts: an introduction and motivating examples, modeling techniques, model-driven prediction, measurement and metrics, testing techniques, case studies, and conclusions. The core is formed by 12 technical papers, which are framed by motivating real-world examples and case studies, thus illustrating the necessity and the application of the presented methods. While the technical chapters are independent of each other and can be read in any order, the reader will benefit more from the case studies if he or she reads them together with the related techniques. The papers combine topics like modeling, benchmarking, testing, performance evaluation, and dependability, and aim at academic and industrial researchers in these areas as well as graduate students and lecturers in related fields. In this volume, they will find a comprehensive overview of the state of the art in a field of continuously growing practical importance.

Cyber Resilience of Systems and Networks

Cyber Resilience of Systems and Networks
Author: Alexander Kott
Publisher: Springer
Total Pages: 471
Release: 2018-05-30
Genre: Technology & Engineering
ISBN: 3319774921

This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats. The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term. The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas.

Software Engineering in the Era of Cloud Computing

Software Engineering in the Era of Cloud Computing
Author: Muthu Ramachandran
Publisher: Springer Nature
Total Pages: 367
Release: 2020-01-01
Genre: Computers
ISBN: 3030336247

This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.

Real-Time Embedded Systems

Real-Time Embedded Systems
Author: Xiaocong Fan
Publisher: Newnes
Total Pages: 687
Release: 2015-02-25
Genre: Computers
ISBN: 012801718X

This book integrates new ideas and topics from real time systems, embedded systems, and software engineering to give a complete picture of the whole process of developing software for real-time embedded applications. You will not only gain a thorough understanding of concepts related to microprocessors, interrupts, and system boot process, appreciating the importance of real-time modeling and scheduling, but you will also learn software engineering practices such as model documentation, model analysis, design patterns, and standard conformance.This book is split into four parts to help you learn the key concept of embedded systems; Part one introduces the development process, and includes two chapters on microprocessors and interrupts---fundamental topics for software engineers; Part two is dedicated to modeling techniques for real-time systems; Part three looks at the design of software architectures and Part four covers software implementations, with a focus on POSIX-compliant operating systems.With this book you will learn:The pros and cons of different architectures for embedded systems POSIX real-time extensions, and how to develop POSIX-compliant real time applications How to use real-time UML to document system designs with timing constraintsThe challenges and concepts related to cross-development Multitasking design and inter-task communication techniques (shared memory objects, message queues, pipes, signals)How to use kernel objects (e.g. Semaphores, Mutex, Condition variables) to address resource sharing issues in RTOS applications The philosophy underpinning the notion of "resource manager" and how to implement a virtual file system using a resource manager The key principles of real-time scheduling and several key algorithms - Coverage of the latest UML standard (UML 2.4) - Over 20 design patterns which represent the best practices for reuse in a wide range of real-time embedded systems - Example codes which have been tested in QNX---a real-time operating system widely adopted in industry

Model-Driven Testing

Model-Driven Testing
Author: Paul Baker
Publisher: Springer Science & Business Media
Total Pages: 176
Release: 2007-09-23
Genre: Computers
ISBN: 3540725636

Written by the original members of an industry standardization group, this book shows you how to use UML to test complex software systems. It is the definitive reference for the only UML-based test specification language, written by the creators of that language. It is supported by an Internet site that provides information on the latest tools and uses of the profile. The authors introduce UTP step-by-step, using a case study that illustrates how UTP can be used for test modeling and test specification.

Handbook Of Software Aging And Rejuvenation: Fundamentals, Methods, Applications, And Future Directions

Handbook Of Software Aging And Rejuvenation: Fundamentals, Methods, Applications, And Future Directions
Author: Tadashi Dohi
Publisher: World Scientific
Total Pages: 424
Release: 2020-04-22
Genre: Computers
ISBN: 9811214581

The Handbook of Software Aging and Rejuvenation provides a comprehensive overview of the subject, making it indispensable to graduate students as well as professionals in the field. It begins by introducing fundamental concepts, definitions, and the history of software aging and rejuvenation research, followed by methods, tools, and strategies that can be used to detect, analyze, and overcome software aging.