3 research outputs found

    Observation-enhanced verification of operational processes

    Get PDF
    Operational processes are at the core of many organisations. The failure and misuse of these processes can cause significant economic losses to businesses or, in the worst cases, endanger human life. As a result, there has been significant research effort focused on the development of techniques and tools for the model-based analysis and verification of reliability, performance and quality-of-service properties of processes. Constructing models which accurately represent the behaviour of real-world systems is very challenging. The complexity and stochastic nature of real-world phenomena requires the use of modelling assumptions which introduce errors that can significantly impact the results of model-based analysis. Where inaccurate analyses are used as the basis of engineering or business decisions, the consequences can be catastrophic. Many operational processes are now routinely instrumented and capture information about component interactions and the behaviour of human operators. This thesis introduces a set of tool-supported techniques which exploit these logs in conjunction with tried and tested probabilistic model checking. This produces Markov models and formal analysis techniques which more accurately capture process behaviours and improve the quality of model-based analysis for operational processes. We show how observation data can be used to improve the modelling and analysis of continuous time systems by refining continuous-time Markov models (CTMCs) to more accurately reflect real-world behaviours. We apply the tools and techniques developed to real-world processes and demonstrate how we may avoid the invalid decisions which arise from traditional CTMC modelling and analysis techniques. We also show how observation-enhanced discrete time Markov models may be used to characterise the behaviour of users within an operational process. The self-adaptive role based access control approach we develop uses a formal definition of adaptation policies to identify potential threats in a real-world IT support system and mitigates risks to the system
    corecore