The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon...The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.展开更多
The main structure and key techniques of our Virtual Exhibition Software are summarized. It demonstrates the practice of Software Engineering during the development of our project and discusses the use of UML in it.
The use of mathematics for documenting, in- specting, and testing software is explained and illus- trated. Three measures of software quality are described and discussed. Then three distinct complementary approaches t...The use of mathematics for documenting, in- specting, and testing software is explained and illus- trated. Three measures of software quality are described and discussed. Then three distinct complementary approaches to software quality assurance are presented. A case study, the testing and inspection of a safety-critical system, is discussed in detail.展开更多
The Capability Maturity Model(CMM) and ISO9001 are probably the two best known and most widely used models for software organization quality assurance and improvement. As they both continue to evolve, each has a serie...The Capability Maturity Model(CMM) and ISO9001 are probably the two best known and most widely used models for software organization quality assurance and improvement. As they both continue to evolve, each has a series of versions which own new aspects. This paper discusses the similarities and differences between the two models, based on the CMM version 2.0 c and the 1997 release of ISO9001, examines 20 clauses in ISO9001 and maps them to practices in the latest CMM. In the end, their implementations in China are presented.展开更多
文摘The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.
文摘The main structure and key techniques of our Virtual Exhibition Software are summarized. It demonstrates the practice of Software Engineering during the development of our project and discusses the use of UML in it.
文摘The use of mathematics for documenting, in- specting, and testing software is explained and illus- trated. Three measures of software quality are described and discussed. Then three distinct complementary approaches to software quality assurance are presented. A case study, the testing and inspection of a safety-critical system, is discussed in detail.
基金Supported by the National College Doctoral Degree F und of Ministry of Education(970 35 90 1)
文摘The Capability Maturity Model(CMM) and ISO9001 are probably the two best known and most widely used models for software organization quality assurance and improvement. As they both continue to evolve, each has a series of versions which own new aspects. This paper discusses the similarities and differences between the two models, based on the CMM version 2.0 c and the 1997 release of ISO9001, examines 20 clauses in ISO9001 and maps them to practices in the latest CMM. In the end, their implementations in China are presented.