On the Requirements of High-Integrity Code Generation

نویسندگان

  • Michael W. Whalen
  • Mats Per Erik Heimdahl
چکیده

Although formal requirements specifications can provide a complete and consistent description of a safetycritical software system, designing and developing production quality code from high-level specifications can be a time-consuming and error-prone process. Automated translation, or code generation, of the specification to production code can alleviate many of the problems associated with design and implementation. However, current approaches have been unsuitable for safety-critical environments because they employ complex and/or ad-hoc methods

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generation of the Secret Encryption Key Using the Signature of the Embedded System

Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the signature of the embedded system. We explore t...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

High-Integrity Production Code Generation

The software integrity level is then derived based on its contribution to the failure condition. If the system response to a software-induced failure is catastrophic, or severely impedes safe flight, the software must be developed as high-integrity software. In recent years, high-integrity software has become more pervasive and increasingly complex as new aircraft systems increase their relianc...

متن کامل

Determining the factors affecting the evaluation of business intelligence systems with an emphasis on the integrity of Organizational resources

In the information age, the speed of producing and supplying valuable information is considered as one of the keys to success in the organizations and institutes.The major objective of this study was to investigate and specify the effective factors in evaluating the BI systems with an emphasis on the integrity of organizational resources. First, five factors were determined as the major factors...

متن کامل

Requirements for Third Generation University: A Conceptual Review of Iranian Studies

Introduction: For more than a decade, Iranian researchers have been concerned about the third- generation university and have conducted various studies in this field. Collecting and analyzing the ideas presented in these studies may pave the way for finding a path for transformation into third-generation university. This study tries to introduce the requirements of moving Iranian universities t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999