Abstract
A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here, we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling Language to formally specify and validate an abstraction of the system.
Similar content being viewed by others
References
Ahrendt W, Baar T, Beckert B, Bubel R, Giese M, Hähnle R, Menzel W, Mostowski W, Roth A, Schlager S, Schmitt PH (2005) The KeY Tool. Softw Syst Model 4: 32–54
Balfe S, Li S, Zhou J (2006) Pervasive trusted computing. In: 2nd international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU), pp 88–94. IEEE Computer Society, Lyon
Bartetzko D, Fischer C, Möller M, Wehrheim H (2001) Jass-Java with Assertions. Electr Notes Theor Comput Sci 55(2)
Beckert B, Hähnle R, Schmitt PH (eds) (2007) Verification of object-oriented software: the KeY approach. LNCS 4334. Springer
Bohn J, Coroama V, Langheinrich M, Mattern F, Rohs M (2005) Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In: Weber W, Rabaey J, Aarts E (eds) Ambient intelligence. Springer, Berlin, pp 5–29
Bousquet L, Ledru Y, Maury O, Oriat C, Lanet JL (2004) A case study in JML-based software validation (short paper). In: Proceedings of 19th Int. IEEE Conf. on Automated Sofware Engineering (ASE’04), pp 294–297
Burdy L, Cheon Y, Cok DR, Ernst MD, Kiniry JR, Leavens GT, Leino KRM, Poll E (2005) An overview of JML tools and applications. STTT 7(3): 212–232
Busi N, Gorrieri R, Guidi C, Lucchi R, Zavattaro G. (2005) Towards a formal framework for choreography. In: Enabling technologies: infrastructure for collaborative enterprise. 14th IEEE international workshops on 13–15 June 2005, pp 107–112
Candolin C (2007) A security framework for service oriented architectures. In: Military communications conference, 2007. MILCOM. IEEE, pp 1–6, 29–31 Oct 2007
Canfora G, Di Penta M (2006) Testing services and service-centric systems: challenges and opportunities. IT Prof 8(2): 10–17
Cheon Y, Leavens G (2002) A simple and practical approach to unit testing: the JML and JUnit way. In: ECOOP 2002. LNCS, vol 2474. Springer, pp 231–255
Cohen D, Dalal S, Parelius J, Patton G (1996) The combinatorial design approach to automatic test generation. IEEE Softw 13(5): 83–88
Controneo D, Di Flora C, Russo S (2003) Improving dependability of service oriented architectures for pervasive computing. Object-oriented real-time dependable systems, 2003. (WORDS 2003). In: Proceedings of the eighth international workshop on 15–17 Jan 2003, pp 74–81
Dai G, Bai X, Wang F, Dai F (2007) Contract-based testing for web services. In: 31st annual international computer software and applications conference (COMPSAC). IEEE Computer Society, Beijing, China, pp 517–526
Dragoni N, Massacci F, Naliuka K, Siahaan I (2007) Security- by-contract: toward a semantics for digital signatures on mobile code. In: 4th European public key infrastructure workshop: theory and practice (EuroPKI). LNCS, vol 4582. Springer, Palma de Mallorca, Spain, pp 297–312
du Bousquet L (1999) Feature interaction detection using testing and model-checking, experience report. In: World congress on formal methods. LNCS, vol 1708, Springer, Toulouse, pp 622–641
Flanagan C, Leino KRM, Lillibridge M, Nelson G, Saxe JB, Stata R (2002) Extended static checking for Java. In: Proc. of the ACM SIGPLAN 2002 conference on programming language design and implementation. ACM Press, pp 234–245
Foster H, Uchitel S, Magee J, Kramer J (2003) Model-based verification of Web service compositions. In: Automated software engineering, 2003. Proceedings. 18th IEEE international conference on 6–10 Oct 2003, pp 152–161
Geer D (2006) Nanotechnology: the growing impact of shrinking computers. Pervasive Comput 5(1): 7–11
Jackson M (1999) The role of formalism in method. In: Formal methods, world congress on formal methods in the development of computing systems (FM99). LNCS, vol 1708. Springer, Toulouse, p 56
The JML Home Page (2005). http://www.jmlspecs.org
Karaorman M, Abercrombie P (2005) Contractor: introducing design-by-contract to java using reflective bytecode instrumentation. Form Methods Syst Des 27(3): 275–312
Karaorman M, Holzle U, Bruno J (1999) Contractor: a reflective java library to support design by contract. Tech. rep., Santa Barbara
Kolberg M, Magill E, Wilson M (2003) Compatibility issues between services supporting networked appliances. IEEE Commun Mag 41: 136–147
Lamparter S, Luckner S, Mutschler S (2007) Formal specification of web service contracts for automated contracting and monitoring. In: 40th Hawaii international conference on systems science (HICSS). IEEE Computer Society, Big Island, p 63
Langheinrich M, Coroama V, Bohn J, Mattern F (2005) Living in a smart environment—implications for the coming ubiquitous information society. Telecommun Rev 15(1): 132–143
Leavens G, Baker A, Ruby C (1999) JML: a notation for detailed design. In: Kilov H, Rumpe B, Simmonds I (eds) Behavioral specifications of businesses and systems. Kluwer, Dordrecht, pp 175–188
Ledru Y, du Bousquet L, Maury O, Bontron P (2004) Filtering TOBIAS combinatorial test suites. In: Fundamental approaches to software engineering (FASE’04). LNCS, vol (to appear). Springer, Barcelona
Loke SW (2003) Service-oriented device ecology workflows. In: First international conference on service-oriented computing (ICSOC 2003). LNCS, vol 2910. Springer, Trento, pp 559–574
Matsushita Electric Industrial Co., L Kurashi Net (jp). http://national.jp/appliance/product/kurashi-net/
Meyer B Object-oriented software construction, 2nd edn
Meyer B (1992) design by contract. Computer 25(10): 40–51
Nakajima S (2002) Model-checking verification for reliable web services. In: Workshop on Object-Oriented Web Services, collocated with OOPSLA
Nakamura M, Tanaka A, Igaki H, Tamada H, Matsumoto K (2006) Adapting legacy home appliances to home network systems using web services. In: Int. Conf. on Web Services (ICWS 2006). IEEE, pp 849–858
Nakamura M, Tanaka A, Igaki H, Tamada H, Matsumoto K (2008) Constructing home network systems and integrated services using legacy home appliances and web services. Int J Web Serv Res, to appear
Papazoglou MP, Georgakopoulos D (2003) Special issue: service-oriented computing. Introduction. Commun ACM 46(10): 24–28
Pfadenhauer K, Dustdar S, Kittl B (2005) Challenges and solutions for model-driven Web service composition. Enabling technologies: infrastructure for collaborative enterprise, 2005. In: 14th IEEE international workshops on 13–15 June 2005, pp 126–131
Plath M, Ryan MD (2000) The feature construct for SMV: semantics. In: Feature interactions in telecommunications and software systems VI. Glasgow, pp 129–144
Rushby JM (1999) Mechanized formal methods: where next? In: Formal methods, world congress on formal methods in the development of computing systems (FM99). LNCS, vol 1708. Springer, Toulouse, pp 48–51
TOSHIBA: Toshiba home network: feminity. http://www3.toshiba.co.jp/feminity/feminity_eng/
Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7): 74–84
Yan B, Nakamura M, du Bousquet L, ichi Matsumoto K (2007) Characterizing safety of integrated services in home network system. In: 5th international conference on smart homes and health telematics (ICOST), LNCS, vol. 4541. Springer, Nara, pp 130–140
Yi X, Kochut K (2004) A CP-nets-based design and verification framework for Web services composition. IEEE int. conf. on web services, 6–9 July 2004, pp 756–760
Author information
Authors and Affiliations
Corresponding author
Additional information
This is a substantially revised version of our paper that appeared in the proceedings of the Workshop On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), Poitiers-Futuroscope, France, December 2007.
Rights and permissions
About this article
Cite this article
du Bousquet, L., Nakamura, M., Yan, B. et al. Using formal methods to increase confidence in a home network system implementation: a case study. Innovations Syst Softw Eng 5, 181–196 (2009). https://doi.org/10.1007/s11334-009-0092-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11334-009-0092-5