Trustworthy Construction Approach of BPR Software System Based on Semantic Model Verification
نویسندگان
چکیده
Addressing to improve the trustworthiness of Business Process Re-engineering (BPR) system, this paper proposes a trustworthy construction approach to solve the problem mentioned above. Firstly, we analyze related literatures about the topic, we realize that main reason causing to reduce trustworthiness of BPR system is due to break of trustworthy connectivity between front configuration tools and business processes operating server. Secondly, as the primary methods composing of the construction approach, a semantic verification method is illustrated in detail based on Petri net. Finally, a case study is introduced to explain how to use the above construction approach of BPR system.
منابع مشابه
Component-based hardware/software co-verification for building trustworthy embedded systems
We present a novel component-based approach to hardware/software co-verification of embedded systems using model checking. Embedded systems are pervasive and often mission-critical, therefore, they must be highly trustworthy. Trustworthy embedded systems require extensive verification. The close interactions between hardware and software of embedded systems demand co-verification. Due to their ...
متن کاملComponent - Based Hardware / Software Co - Verification for Building Trustworthy
We present a novel component-based approach to hardware/software co-verification of embedded systems using model checking. Embedded systems are pervasive and often mission-critical, therefore, they must be highly trustworthy. Trustworthy embedded systems require extensive verification. The close interactions between hardware and software of embedded systems demand co-verification. Due to their ...
متن کاملA formal approach for the specification and verification of trustworthy component-based systems
Software systems are increasingly becoming ubiquitous affecting the way we experience the world. Embedded software systems, especially those used in smart devices, have become an essential constituent of the technological infrastructure of modern societies. Such systems, in order to be trusted in society, must be proved to be trustworthy. Trustworthiness is a composite non-functional property t...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کامل