Skip to main content

Assurance Cases for Block-Configurable Software

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8666))

Included in the following conference series:

Abstract

One means of supporting software evolution is to adopt an architecture where the function of the software is defined through reconfiguring the flow of execution and parameters of pre-existing components. For such software it is desirable to maximise the reuse of assurance assets, and minimise re-verification effort in the presence of change. In this paper we describe how a modular assurance case can be established based upon formal analysis of the necessary preconditions of the component. Our approach supports the reuse of arguments and evidence established for components, including the results of the formal analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO/IEC 13568:2002. Information technology—Z formal specification notation—syntax, type system and semantics. International Standard

    Google Scholar 

  2. Barthe, G., Burdy, L., Charles, J., Grégoire, B., Huisman, M., Lanet, J.-L., Pavlova, M.I., Requet, A.: JACK - A Tool for Validation of Security and Behaviour of Java Applications. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol. 4709, pp. 152–174. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Cavalcanti, A.L.C., King, S., O’Halloran, C., Woodcock, J.C.P.: Test-Data Generation for Control Coverage by Proof. In: Formal Aspects of Computing (2013), doi:10.1007/s00165-013-0279-2 (online first)

    Google Scholar 

  4. Cavalcanti, A.L.C., Woodcock, J.C.P.: A Weakest Precondition Semantics for Circus. In: Communicating Processing Architectures 2002. IOS Press (2002)

    Google Scholar 

  5. Cohen, E., Dahlweid, M., Hillebrand, M., Leinenbach, D., Moskal, M., Santen, T., Schulte, W., Tobies, S.: VCC: A Practical System for Verifying Concurrent C. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 23–42. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. GSN Standardisation Committee. GSN community standard (November 2011)

    Google Scholar 

  7. de Moura, L., Bjørner, N.: Satisfiability modulo theories: introduction and applications. Communications of the ACM 54(9), 69–77 (2011)

    Article  Google Scholar 

  8. Dijkstra, E.W.: A Discipline of Programming. Prentice-Hall (1976)

    Google Scholar 

  9. Dijkstra, E.W., Scholten, C.S.: Predicate Calculus and Program Semantics. Texts and Monographs in Computer Science. Springer (1989)

    Google Scholar 

  10. Faulkner, A.G., Bennett, P.A., Pierce, R.H., Johnston, I.H.A., Storey, N.: The Safety Management of Data-Driven Safety-Related Systems. In: Koornneef, F., van der Meulen, M.J.P. (eds.) SAFECOMP 2000. LNCS, vol. 1943, pp. 86–95. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Gordon, M.J.C., Melham, T.F. (eds.): Introduction to HOL: A Theorem Proving Environment for Higher Order Logic. Cambridge University Press (1993)

    Google Scholar 

  12. Object Management Group. Structured assurance case metamodel (SACM). OMG Standard Document, 2013. OMG Document Number: formal/2013-02-01

    Google Scholar 

  13. Hawkins, R., Miyazawa, A., Cavalcanti, A.L.C., Kelly, T., Rowlands, J.: Assurance Cases for Data-configured Software. Technical report, University of York, Department of Computer Science, York, UK (2014), http://www-users.cs.york.ac.uk/~rhawkins/HMCKR14.pdf

  14. Knight, J.C., Strunk, E.A., Greenwell, W.S., Wasson, K.S.: Specification and Analysis of Data for Safety-Critical Systems. In: ISSC (2004)

    Google Scholar 

  15. Mraihi, O., Ghardallou, W., Louhichi, A., Labed Jilani, L., Bsaies, K., Mili, A.: Computing preconditions and postconditions of while loops. In: Cerone, A., Pihlajasaari, P. (eds.) ICTAC 2011. LNCS, vol. 6916, pp. 173–193. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  16. Nipkow, T.: Winskel is (almost) Right: Towards a Mechanized Semantics. Formal Aspects of Computing 10(2), 171–186 (1998)

    Article  MATH  Google Scholar 

  17. Tillotson, J.: System safety and management information systems. In: Redmill, F., Anderson, T. (eds.) Aspects of Safety Management, pp. 13–34. Springer (2001)

    Google Scholar 

  18. Woodcock, J.C.P., Davies, J.: Using Z—Specification, Refinement, and Proof. Prentice-Hall (1996)

    Google Scholar 

  19. Broy, M.: A core theory of interfaces and architecture and its impact on object orientation. In: Reussner, R., Stafford, J.A., Ren, X.-M. (eds.) Architecting Systems. LNCS, vol. 3938, pp. 26–47. Springer, Heidelberg (2006)

    Google Scholar 

  20. Lau, K.-K., Tran, C.M.: X-man: An mde tool for component-based system development. In: 39th Euromicro Conference on Software Engineering and Advanced Applications, pp. 158–165 (2012)

    Google Scholar 

  21. Barnes, J.: High Integrity Software: The SPARK Approach to Safety and Security. Addison-Wesley (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hawkins, R., Miyazawa, A., Cavalcanti, A., Kelly, T., Rowlands, J. (2014). Assurance Cases for Block-Configurable Software. In: Bondavalli, A., Di Giandomenico, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8666. Springer, Cham. https://doi.org/10.1007/978-3-319-10506-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10506-2_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10505-5

  • Online ISBN: 978-3-319-10506-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics