Defensive Approaches to Testing Systems that Contain COTS and Third-Party Functionality

نویسنده

  • Jeffrey Voas
چکیده

Most systems today are composed of hardware components, COTS software, and custom software. When a system fails, a confusing and complex liability problem ensues for all parties that have contributed software and hardware functionality to the composite system. This paper presents a consumer-oriented methodology for predicting what impact on system quality a particular Commercial-Off-The-Shelf (COTS) software component will have. When the result computed by the custom software causes a system failure, it becomes necessary to track down why that result occurred. If it is because of a logical defect in the custom software, then the vendor of the custom software is liable. If the result occurred because of a failure of a COTS software component (upon which the custom software was dependent for information), then the COTS vendor should be liable. Regardless of how these events might get argued in a court case and who would prevail, those persons responsible for integrating custom and COTS software together should take pro-active steps to ensure that all safeguards against COTS software failures have been taken. That is clearly their best legal defense strategy. This paper presents methods that provide those safeguards.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An approach to testing COTS software for robustness to operating system exceptions and errors

One of the least tested but most critical portions of software systems is error and exception handling Er ror exception handling routines are the safety net for any system to handle unexpected circumstances such as when operating system OS or hardware failures occur As more critical systems are developed from commercial o the shelf COTS software the robust ness of these applications to operatin...

متن کامل

Examining Security Certification and Access Control Conflicts Using Deontic Logic

Component-based software has become a mainstream practice as organizations attempt to streamline application development tasks. These applications invariably contain third-party Commercial-off-the-Shelf (COTS) systems with black box functionality. When integrated applications require security certification, COTS components, even if individually certified, may introduce vulnerabilities into the ...

متن کامل

Integrating third party AI components into mainstream applications

Software engineers must make numerous decisions throughout the development lifecycle. CASE (Computer-aided Software Engineering) tools offer decision support facilities to aide engineer in project planning, estimating, requirements analysis and tracking, design, configuration control, coding, testing, integration and maintenance. As the features of and demand for these tools increase, the compl...

متن کامل

Testing for Asymmetric Information in Automobile Insurance Market an Iranian Insurance Company

The presence of asymmetric information is an important source of efficiency loss for insurance companies and could reduce profitability. In this paper, we test the conditional independence of coverage choice and risk, where “conditional” means conditional on all variables observed by the insurer. We use two parametric methods: a pair of probits and a bivariate probit model. The data includes al...

متن کامل

Certification of COTS Software in NASA Human Rated Flight Systems

Adoption of commercial off-the-shelf (COTS) products in safety critical systems has been seen as a promising acquisition strategy to improve mission affordability and, yet, has come with significant barriers and challenges. Attempts to integrate COTS software components into NASA human rated flight systems have been, for the most part, complicated by verification and validation (V&V) requiremen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998