High-Integrity System Specification and Design

High-Integrity System Specification and Design

Author: Jonathan P. Bowen

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 698

ISBN-13: 1447134311

DOWNLOAD EBOOK

Errata, detected in Taylor's Logarithms. London: 4to, 1792. [sic] 14.18.3 6 Kk Co-sine of 3398 3298 - Nautical Almanac (1832) In the list of ERRATA detected in Taylor's Logarithms, for cos. 4° 18'3", read cos. 14° 18'2". - Nautical Almanac (1833) ERRATUM ofthe ERRATUM ofthe ERRATA of TAYLOR'S Logarithms. For cos. 4° 18'3", read cos. 14° 18' 3". - Nautical Almanac (1836) In the 1820s, an Englishman named Charles Babbage designed and partly built a calculating machine originally intended for use in deriving and printing logarithmic and other tables used in the shipping industry. At that time, such tables were often inaccurate, copied carelessly, and had been instrumental in causing a number of maritime disasters. Babbage's machine, called a 'Difference Engine' because it performed its cal culations using the principle of partial differences, was intended to substantially reduce the number of errors made by humans calculating the tables. Babbage had also designed (but never built) a forerunner of the modern printer, which would also reduce the number of errors admitted during the transcription of the results. Nowadays, a system implemented to perform the function of Babbage's engine would be classed as safety-critical. That is, the failure of the system to produce correct results could result in the loss of human life, mass destruction of property (in the form of ships and cargo) as well as financial losses and loss of competitive advantage for the shipping firm.


High Integrity Systems and Safety Management in Hazardous Industries

High Integrity Systems and Safety Management in Hazardous Industries

Author: J.R Thomson

Publisher: Butterworth-Heinemann

Published: 2015-01-09

Total Pages: 359

ISBN-13: 0128020342

DOWNLOAD EBOOK

This book is about the engineering management of hazardous industries, such as oil and gas production, hydrocarbon refining, nuclear power and the manufacture of chemicals and pharmaceuticals. Its scope includes an overview of design standards and processes for high integrity systems,safety management processes as applied to hazardous industries and details best practices in design, operations, maintenance and regulation. Selected case studies are used to show how the complex multidisciplinary enterprises to design and operate hazardous plant can sometimes fail. This includes the subtlety and fragility of the robust safety culture that is required. It is aimed at professional engineers who design, build and operate these hazardous plants. This book is also written for business schools and university engineering departments where engineering management is studied. - An overview of design standards and processes for high integrity systems - An overview of safety management processes as applied to hazardous industries - Best practices in design, operations, maintenance and regulation


High-Integrity Software

High-Integrity Software

Author: C.T. Sennett

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 369

ISBN-13: 1468457756

DOWNLOAD EBOOK

4. 3 The Gypsy language 72 4. 4 The Gypsy Verification Environment 73 4. 5 A simple example 81 4. 6 Specification data types 91 4. 7 Future directions 95 100 4. 8 Conclusions 5 Reliable programming in standard languages 102 Bernard Carre, Program Validation Ltd. 5. 1 Introduction 102 5. 2 Language requirements for high-integrity programming 103 5. 3 The use of standard languages 108 5. 4 Programming in Pascal and Ada 110 1'19 5. 5 Practical experiences NewSpeak: a reliable programming language 6 122 I. F. Currie, Royal Signals and Radar Establishment 6. 1 Introduction 122 6. 2 Types and values 127 6. 3 Declarations and variables 132 6. 4 Guarded declarations 134 6. 5 Cases and conditionals 136 6. 6 Loops 138 6. 7 Procedures 140 6. 8 Assertions 145 6. 9 Timing 147 6. 10 Conclusion 149 6. 11 Appendix 1: summary of syntax 150 6. 12 Appendix 2: type lattice and widening 156 7 Program analysis and systematic testing 159 M. A. Hennell, University of Liverpool, and D. Hedley and I. J. Riddell, Liverpool Data Research Associates Ltd. 7. 1 Introduction 159 7. 2 The basic requirement 160 7. 3 The Liverpool experience 161 7. 4 The Liverpool experiments 162 7. 5 The LDRA Testbeds 163 Interpretation 169 7. 6 7. 7 Applicability and benefits 171 7. 8 Safety-critical systems 173 VI 8 Program analysis and verification 176 Bernard Carre, Program Validation Ltd. 8. 1 Introduction 176 8.


High Integrity Software

High Integrity Software

Author: Victor L. Winter

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 333

ISBN-13: 146151391X

DOWNLOAD EBOOK

The second half of the twentieth century has witnessed remarkable advances in technology. The unquestioned leader in this race has been computer technology. Even the most modest personal computers today have computing power that would have astounded the leading technol ogists a few decades earlier, and what's more, similar advances are pre dicted for many years to come. Looking towards the future, it has been conservatively estimated that in 2047 computers could easily be 100,000 times more powerful than they were in 1997 (Moore's law [Moore] would lead to an increase on the order of around 10 billion) [Bell]. Because of its enormous capability, computer technology is becoming pervasive across the technology spectrum. Nowadays it is not surpris ing to discover that very common household gadgets like your toaster contain computer technology. Televisions, microwave ovens, and even electric shavers contain software. And what's more, the use of computer technology has been estimated to double every two years [Gibbs]. In order to keep up with the growing technology demands and to fully utilize the ever more powerful computing platforms, software projects have become more and more ambitious. This has lead to software systems becoming dominant forces in system functionality. Further more, the ambition to realize significant portions of a system's function ality through software has extended into the high consequence realm. Presently, software controls many critical functions in (1) airplanes, (2) electronic commerce, (3) space-bound systems, (4) medical systems, and (5) various transportation systems such as automobiles and trains.


Architecting Secure Software Systems

Architecting Secure Software Systems

Author: Asoke K. Talukder

Publisher: CRC Press

Published: 2008-12-17

Total Pages: 480

ISBN-13: 1420087851

DOWNLOAD EBOOK

Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so tha


Building High Integrity Applications with SPARK

Building High Integrity Applications with SPARK

Author: John W. McCormick

Publisher: Cambridge University Press

Published: 2015-08-31

Total Pages: 383

ISBN-13: 1316368386

DOWNLOAD EBOOK

Software is pervasive in our lives. We are accustomed to dealing with the failures of much of that software - restarting an application is a very familiar solution. Such solutions are unacceptable when the software controls our cars, airplanes and medical devices or manages our private information. These applications must run without error. SPARK provides a means, based on mathematical proof, to guarantee that a program has no errors. SPARK is a formally defined programming language and a set of verification tools specifically designed to support the development of software used in high integrity applications. Using SPARK, developers can formally verify properties of their code such as information flow, freedom from runtime errors, functional correctness, security properties and safety properties. Written by two SPARK experts, this is the first introduction to the just-released 2014 version. It will help students and developers alike master the basic concepts for building systems with SPARK.


Engineering Quality Software

Engineering Quality Software

Author: D.J. Smith

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 287

ISBN-13: 9400911211

DOWNLOAD EBOOK

During the 18 months since the publication of the 1st edition the practice of software quality and the availability of tools and guidance for its implementation has increased dramatically. The emphasis on the need for formal methods has increased and calls for certification of safety critical software are now common. In particular this 2nd edition: -Expands the treatment of static analysis and includes a com prehensive but simple example in order to illustrate clearly the functions of each analyser in Chapter 8. -Describes formal requirements languages more fully in Chapter 6. -Updates the compendium of available guidelines and standards in Chapter 5. -Expands the description of the many high level languages in Chapter 9. -Improves and expands the exercise into a 49 page case study consisting of a documentation hierarchy for a safety system in Chapter 14. It is seeded with deliberate errors and ambiguities and now includes guidance in finding them.


JGI '02

JGI '02

Author: ACM Special Interest Group on Programming Languages

Publisher: Assocation of Computing Machinery

Published: 2002

Total Pages: 260

ISBN-13: 9781581135992

DOWNLOAD EBOOK


Reliable Software Technologies - Ada-Europe 2008

Reliable Software Technologies - Ada-Europe 2008

Author: Fabrice Kordon

Publisher: Springer

Published: 2008-06-11

Total Pages: 294

ISBN-13: 354068624X

DOWNLOAD EBOOK

th The 13 edition of the International Conference on Reliable Software Technologies (Ada-Europe 2008) marked its arrival in Italy by selecting the splendid venue of Venice. It did so after having been hosted twice in Switzerland, Spain and the UK (Montreux for its inauguration in 1996 and Geneva in 2007; Santander in 1999 and Palma de Mallorca in 2004; London in 1997 and York in 2005), and having visited Sweden (Uppsala, 1998), Germany (Potsdam, 2000), Belgium (Leuven, 2001), Austria (Vienna, 2002), France (Toulouse, 2003) and Portugal (Porto, 2006). It was certainly high time that the conference came to Italy! The conference series, which is run and sponsored by Ada-Europe, chooses its yearly venue following two driving criteria: to celebrate the activity of one of its national member societies in a particular country, and/or to facilitate the formation, or the growth, of a national community around all aspects of reliable software technologies. The success of this year’s conference, beside the richness of its technical and social program, will thus be measured by its lasting effects. We can only hope that the latter will be as good and vast as the former! Owing to the absence of a national society associated with Ada-Europe in Italy, the organization of the conference was technically sustained by selected members of the Board of Ada-Europe, its governing body, with some invaluable local support.