Abstract
One means of supporting software evolution is to adopt an architecture where the function of the software is defined through reconfiguring the flow of execution and parameters of pre-existing components. For such software it is desirable to maximise the reuse of assurance assets, and minimise re-verification effort in the presence of change. In this paper we describe how a modular assurance case can be established based upon formal analysis of the necessary preconditions of the component. Our approach supports the reuse of arguments and evidence established for components, including the results of the formal analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ISO/IEC 13568:2002. Information technology—Z formal specification notation—syntax, type system and semantics. International Standard
Barthe, G., Burdy, L., Charles, J., Grégoire, B., Huisman, M., Lanet, J.-L., Pavlova, M.I., Requet, A.: JACK - A Tool for Validation of Security and Behaviour of Java Applications. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol. 4709, pp. 152–174. Springer, Heidelberg (2007)
Cavalcanti, A.L.C., King, S., O’Halloran, C., Woodcock, J.C.P.: Test-Data Generation for Control Coverage by Proof. In: Formal Aspects of Computing (2013), doi:10.1007/s00165-013-0279-2 (online first)
Cavalcanti, A.L.C., Woodcock, J.C.P.: A Weakest Precondition Semantics for Circus. In: Communicating Processing Architectures 2002. IOS Press (2002)
Cohen, E., Dahlweid, M., Hillebrand, M., Leinenbach, D., Moskal, M., Santen, T., Schulte, W., Tobies, S.: VCC: A Practical System for Verifying Concurrent C. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 23–42. Springer, Heidelberg (2009)
GSN Standardisation Committee. GSN community standard (November 2011)
de Moura, L., Bjørner, N.: Satisfiability modulo theories: introduction and applications. Communications of the ACM 54(9), 69–77 (2011)
Dijkstra, E.W.: A Discipline of Programming. Prentice-Hall (1976)
Dijkstra, E.W., Scholten, C.S.: Predicate Calculus and Program Semantics. Texts and Monographs in Computer Science. Springer (1989)
Faulkner, A.G., Bennett, P.A., Pierce, R.H., Johnston, I.H.A., Storey, N.: The Safety Management of Data-Driven Safety-Related Systems. In: Koornneef, F., van der Meulen, M.J.P. (eds.) SAFECOMP 2000. LNCS, vol. 1943, pp. 86–95. Springer, Heidelberg (2000)
Gordon, M.J.C., Melham, T.F. (eds.): Introduction to HOL: A Theorem Proving Environment for Higher Order Logic. Cambridge University Press (1993)
Object Management Group. Structured assurance case metamodel (SACM). OMG Standard Document, 2013. OMG Document Number: formal/2013-02-01
Hawkins, R., Miyazawa, A., Cavalcanti, A.L.C., Kelly, T., Rowlands, J.: Assurance Cases for Data-configured Software. Technical report, University of York, Department of Computer Science, York, UK (2014), http://www-users.cs.york.ac.uk/~rhawkins/HMCKR14.pdf
Knight, J.C., Strunk, E.A., Greenwell, W.S., Wasson, K.S.: Specification and Analysis of Data for Safety-Critical Systems. In: ISSC (2004)
Mraihi, O., Ghardallou, W., Louhichi, A., Labed Jilani, L., Bsaies, K., Mili, A.: Computing preconditions and postconditions of while loops. In: Cerone, A., Pihlajasaari, P. (eds.) ICTAC 2011. LNCS, vol. 6916, pp. 173–193. Springer, Heidelberg (2011)
Nipkow, T.: Winskel is (almost) Right: Towards a Mechanized Semantics. Formal Aspects of Computing 10(2), 171–186 (1998)
Tillotson, J.: System safety and management information systems. In: Redmill, F., Anderson, T. (eds.) Aspects of Safety Management, pp. 13–34. Springer (2001)
Woodcock, J.C.P., Davies, J.: Using Z—Specification, Refinement, and Proof. Prentice-Hall (1996)
Broy, M.: A core theory of interfaces and architecture and its impact on object orientation. In: Reussner, R., Stafford, J.A., Ren, X.-M. (eds.) Architecting Systems. LNCS, vol. 3938, pp. 26–47. Springer, Heidelberg (2006)
Lau, K.-K., Tran, C.M.: X-man: An mde tool for component-based system development. In: 39th Euromicro Conference on Software Engineering and Advanced Applications, pp. 158–165 (2012)
Barnes, J.: High Integrity Software: The SPARK Approach to Safety and Security. Addison-Wesley (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hawkins, R., Miyazawa, A., Cavalcanti, A., Kelly, T., Rowlands, J. (2014). Assurance Cases for Block-Configurable Software. In: Bondavalli, A., Di Giandomenico, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8666. Springer, Cham. https://doi.org/10.1007/978-3-319-10506-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-10506-2_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10505-5
Online ISBN: 978-3-319-10506-2
eBook Packages: Computer ScienceComputer Science (R0)