Certifications of Critical Systems – The CECRIS Experience

Certifications of Critical Systems – The CECRIS Experience

Author: Andrea Bondavalli

Publisher: CRC Press

Published: 2022-09-01

Total Pages: 197

ISBN-13: 1000792145

DOWNLOAD EBOOK

In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.


Computer Safety, Reliability, and Security

Computer Safety, Reliability, and Security

Author: Alexander Romanovsky

Publisher: Springer Nature

Published: 2019-09-02

Total Pages: 425

ISBN-13: 3030262502

DOWNLOAD EBOOK

This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2019, 38th International Conference on Computer Safety, Reliability and Security, in September 2019 in Turku, Finland. The 32 regular papers included in this volume were carefully reviewed and selected from 43 submissions; the book also contains two invited papers. The workshops included in this volume are: ASSURE 2019: 7th International Workshop on Assurance Cases for Software-Intensive Systems DECSoS 2019: 14th ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2019: 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems STRIVE 2019: Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms WAISE 2019: Second International Workshop on Artificial Intelligence Safety Engineering


Model-Driven Engineering and Software Development

Model-Driven Engineering and Software Development

Author: Philippe Desfray

Publisher: Springer

Published: 2016-01-04

Total Pages: 447

ISBN-13: 331927869X

DOWNLOAD EBOOK

This book constitutes thoroughly revised and selected papers from the Third International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2015, held in Angers, France, in February 2015. The 25 thoroughly revised and extended papers presented in this volume were carefully reviewed and selected from 94 submissions. They are organized in topical sections named: invited papers; modeling languages, tools and architectures; methodologies, processes and platforms; applications and software development.


Resilience Assessment and Evaluation of Computing Systems

Resilience Assessment and Evaluation of Computing Systems

Author: Katinka Wolter

Publisher: Springer Science & Business Media

Published: 2012-11-02

Total Pages: 485

ISBN-13: 3642290329

DOWNLOAD EBOOK

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of our daily life depend on the correct, reliable and secure operation of often large-scale distributed computing systems. Wolter and her co-editors grouped the 20 chapters from leading researchers into seven parts: an introduction and motivating examples, modeling techniques, model-driven prediction, measurement and metrics, testing techniques, case studies, and conclusions. The core is formed by 12 technical papers, which are framed by motivating real-world examples and case studies, thus illustrating the necessity and the application of the presented methods. While the technical chapters are independent of each other and can be read in any order, the reader will benefit more from the case studies if he or she reads them together with the related techniques. The papers combine topics like modeling, benchmarking, testing, performance evaluation, and dependability, and aim at academic and industrial researchers in these areas as well as graduate students and lecturers in related fields. In this volume, they will find a comprehensive overview of the state of the art in a field of continuously growing practical importance.


Software Engineering in the Era of Cloud Computing

Software Engineering in the Era of Cloud Computing

Author: Muthu Ramachandran

Publisher: Springer Nature

Published: 2020-01-01

Total Pages: 367

ISBN-13: 3030336247

DOWNLOAD EBOOK

This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.


Cyber Resilience of Systems and Networks

Cyber Resilience of Systems and Networks

Author: Alexander Kott

Publisher: Springer

Published: 2018-05-30

Total Pages: 471

ISBN-13: 3319774921

DOWNLOAD EBOOK

This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats. The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term. The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas.


Real-Time Embedded Systems

Real-Time Embedded Systems

Author: Xiaocong Fan

Publisher: Newnes

Published: 2015-02-25

Total Pages: 687

ISBN-13: 012801718X

DOWNLOAD EBOOK

This book integrates new ideas and topics from real time systems, embedded systems, and software engineering to give a complete picture of the whole process of developing software for real-time embedded applications. You will not only gain a thorough understanding of concepts related to microprocessors, interrupts, and system boot process, appreciating the importance of real-time modeling and scheduling, but you will also learn software engineering practices such as model documentation, model analysis, design patterns, and standard conformance.This book is split into four parts to help you learn the key concept of embedded systems; Part one introduces the development process, and includes two chapters on microprocessors and interrupts---fundamental topics for software engineers; Part two is dedicated to modeling techniques for real-time systems; Part three looks at the design of software architectures and Part four covers software implementations, with a focus on POSIX-compliant operating systems.With this book you will learn:The pros and cons of different architectures for embedded systems POSIX real-time extensions, and how to develop POSIX-compliant real time applications How to use real-time UML to document system designs with timing constraintsThe challenges and concepts related to cross-development Multitasking design and inter-task communication techniques (shared memory objects, message queues, pipes, signals)How to use kernel objects (e.g. Semaphores, Mutex, Condition variables) to address resource sharing issues in RTOS applications The philosophy underpinning the notion of "resource manager" and how to implement a virtual file system using a resource manager The key principles of real-time scheduling and several key algorithms - Coverage of the latest UML standard (UML 2.4) - Over 20 design patterns which represent the best practices for reuse in a wide range of real-time embedded systems - Example codes which have been tested in QNX---a real-time operating system widely adopted in industry


Model-Driven Testing

Model-Driven Testing

Author: Paul Baker

Publisher: Springer Science & Business Media

Published: 2007-09-23

Total Pages: 176

ISBN-13: 3540725636

DOWNLOAD EBOOK

Written by the original members of an industry standardization group, this book shows you how to use UML to test complex software systems. It is the definitive reference for the only UML-based test specification language, written by the creators of that language. It is supported by an Internet site that provides information on the latest tools and uses of the profile. The authors introduce UTP step-by-step, using a case study that illustrates how UTP can be used for test modeling and test specification.


Handbook Of Software Aging And Rejuvenation: Fundamentals, Methods, Applications, And Future Directions

Handbook Of Software Aging And Rejuvenation: Fundamentals, Methods, Applications, And Future Directions

Author: Tadashi Dohi

Publisher: World Scientific

Published: 2020-04-22

Total Pages: 424

ISBN-13: 9811214581

DOWNLOAD EBOOK

The Handbook of Software Aging and Rejuvenation provides a comprehensive overview of the subject, making it indispensable to graduate students as well as professionals in the field. It begins by introducing fundamental concepts, definitions, and the history of software aging and rejuvenation research, followed by methods, tools, and strategies that can be used to detect, analyze, and overcome software aging.