نتایج جستجو برای: 4 assurance

تعداد نتایج: 1321914  

2014
Xinlan Jiang

Big data has the features like Volume, Variety, Value and Velocity. Here come the new opportunities and challenges for construction of Chinese quality assurance system of higher vocational education under big data era. There are problems in current quality assurance system of higher vocational education, such as imperfect main body, non-formation of internally and externally incorporated qualit...

2008
Irbis Gallegos Omar Ochoa Ann Q. Gates Steve Roach Salamah Salamah Corina Vela

Numerous formal approaches to software assurance are available, including: runtime monitoring, model checking, and theorem proving. All of these approaches require formal specifications of behavioral properties to verify a software system. Creation of formal specifications is difficult, and previously, there has been inadequate tool support for this task. The Property Specification tool, Prospe...

2010
Patrick J. Graydon John C. Knight Xiang Yin

The technology for building dependable computing systems has advanced dramatically. Nevertheless, there is still no complete solution to building software for critical systems in which every aspect of software dependability can be demonstrated with high confidence. In this paper, we present the results of a case study exploration of the practical limitations on software dependability. We analyz...

2005
Desmond J. Meacham James B. Michael Jeffrey M. Voas

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including s...

2015
Mohammed Ibrahim M. Almanea

................................................................................................................................................... II DECLARATION ...........................................................................................................................................III ACKNOWLEDGEMENT ..............................................................................

2004
Vidal Alonso Secades Alberto Pedrero Esteban Luis Joyanes Aguilar

Internet and World Wide Web appearance in people ́s life has lead to a significant change in their habits, leading to a new situation that must be faced up by the software community. Now, previous acting forms in software assurance are not yet viable leading to a development of applications that has not been accompanied by the needed mechanism to guarantee the systems quality. This lack of guara...

Journal: :IJCCBS 2010
Ibrahim Habli Richard Hawkins Tim Kelly

The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, for software, it is widely accepted that there is a limit on what can be quantitatively demonstrated, e.g., by means of statistical testing and operational experience. To address this limitation, many software standards...

2009
PEDRO GIOVANNI LEON ASHUTOSH SAXENA

Measuring information security has traditionally been daunting task due to the lack of proper tools. Even more, organizations are concerned about suffering security breaches but, most of the time, justifying security investment is a tough task in the absence of a tangible measurement. In this paper, we propose an approach to quantitatively measure different aspects of information security. The ...

2012
Christoph Schuba Suzanne K. McIntosh Elaine R. Palmer David C. Toll Samuel Weber

We demonstrate, by a number of examples, that informationflow security properties can be proved at a level of abstraction that describes only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems using a generalization of intransitive noninterference policies that admit the ability to filter information passed between...

2009
Ibrahim Habli Zoë Stephenson Tim Kelly John McDermid

This paper discusses the complementary role of software assurance arguments and formal mathematical arguments in justifying the achievement of safety and reliability properties within critical applications. This paper reviews the theoretical foundation of this area and proposes a way forward for combining the use of these two forms of arguments in systems and software engineering.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید