On the Requirements of High-Integrity Code Generation
نویسندگان
چکیده
Although formal requirements specifications can provide a complete and consistent description of a safetycritical software system, designing and developing production quality code from high-level specifications can be a time-consuming and error-prone process. Automated translation, or code generation, of the specification to production code can alleviate many of the problems associated with design and implementation. However, current approaches have been unsuitable for safety-critical environments because they employ complex and/or ad-hoc methods
منابع مشابه
Generation of the Secret Encryption Key Using the Signature of the Embedded System
Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the signature of the embedded system. We explore t...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملHigh-Integrity Production Code Generation
The software integrity level is then derived based on its contribution to the failure condition. If the system response to a software-induced failure is catastrophic, or severely impedes safe flight, the software must be developed as high-integrity software. In recent years, high-integrity software has become more pervasive and increasingly complex as new aircraft systems increase their relianc...
متن کاملDetermining the factors affecting the evaluation of business intelligence systems with an emphasis on the integrity of Organizational resources
In the information age, the speed of producing and supplying valuable information is considered as one of the keys to success in the organizations and institutes.The major objective of this study was to investigate and specify the effective factors in evaluating the BI systems with an emphasis on the integrity of organizational resources. First, five factors were determined as the major factors...
متن کاملRequirements for Third Generation University: A Conceptual Review of Iranian Studies
Introduction: For more than a decade, Iranian researchers have been concerned about the third- generation university and have conducted various studies in this field. Collecting and analyzing the ideas presented in these studies may pave the way for finding a path for transformation into third-generation university. This study tries to introduce the requirements of moving Iranian universities t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999