6 research outputs found

    A Dependability Assessment Process for Ensuring Consistent Provisioning of Network Recovery

    Get PDF
    AbstractWe have developed an engineering method to detect errors in provisioning automated recovery processes in multilayer and multi-protocol communications transport networks. Our dependability assessment process leverages inference techniques provided by Semantic Web technologies in order to detect network-device provisioning errors. Provisioning should be accompanied by methodologies, processes, and activities to ensure that it can be trusted to achieve a desired network state. Our method takes into account unique constraints in the telecommunications domain including bottom-up evolution of physical layer technologies to provide connectivity and lack of a universal model of network functionality. We apply our method to assessing the correctness of provisioning decisions for a protection switching application in a transport network in both the spatial and temporal domains

    Certifying Software Component Performance Specifications

    Get PDF
    In component-based software engineering, performance prediction approaches support the design of business information systems on the architectural level. They are based on behavior specifications of components. This work presents a round-trip approach for using, assessing, and certifying the accuracy of parameterized, probabilistic, deterministic, and concurrent performance specifications. Its applicability and effectiveness are demonstrated using the CoCoME benchmark

    Building dependability arguments for software intensive systems

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.Includes bibliographical references (p. 301-308).A method is introduced for structuring and guiding the development of end-to-end dependability arguments. The goal is to establish high-level requirements of complex software-intensive systems, especially properties that cross-cut normal functional decomposition. The resulting argument documents and validates the justification of system-level claims by tracing them down to component-level substantiation, such as automatic code analysis or cryptographic proofs. The method is evaluated on case studies drawn from the Burr Proton Therapy Center, operating at Massachusetts General Hospital, and on the Pret a Voter cryptographic voting system, developed at the University of Newcastle.by Robert Morrison Seater.Ph.D

    The essential synthesis of problem frames and assurance cases

    No full text
    Problem frames and assurance cases are two current research areas that can improve—and have improved—system dependability, in critical and noncritical systems alike. While these two techniques are effective separately, their synthesis is much more powerful. This paper describes the rationale behind the synthesis, the particular pieces that influence each other, and the beginning of a process to integrate th
    corecore