Browse > Article
http://dx.doi.org/10.9709/JKSS.2010.19.1.153

A Strategy for Validation in Preliminary Design Stage using The Simulation of Model Behavior  

Shin, Seung-Hun (아주대학교 정보통신공학과)
Park, Seung-Kyu (아주대학교 정보 및 컴퓨터공학부)
Choi, Kyung-Hee (아주대학교 정보 및 컴퓨터공학부)
Abstract
Most part of errors in software development process are included during the stage of requirements definition and design. And correction or elimination of errors from those stages requires much more efforts and costs than those from the later part of software development process. However, despite of the importance of the validation of requirement definition and design stages, several kinds of problem have made it hard to be done successfully. Therefore, in this paper, we introduce a novel validation process for the preliminary design stage. The validation process is based on simulations of model and it can be used to validate requirements and model simultaneously. Models in the validation process will take only the behavior of software and be built on Ptolemy framework. The usability of our validation process is confirmed with a case study over DNS system environment. And the result of simulation shows well-known errors or vulnerabilities can be found with simulations of model which has the behavior of software. This means our validation process can be used as a process to validate requirements and models during the early stage of software development process.
Keywords
Model Validation; Behavior Test; Domain Name System; Ptolemy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Brooks, C., Lee, E.A., Liu, X., Neuendorffer, S., Zhao, Y., and Zheng, H., Heterogeneous Concurrent Modeling and Design in Java, vol. 1-3, UCB/EECS-2008-28, 29, 37, EECS Dept. UC Berkeley, 2008.
2 Cruickshank, K. J., Michael, J. B., and Shing, M., "A Validation Metrics Framework for Safety-Critical Software- Intensive Systems," Proc. of the 2009 IEEE International Conference on System of Systems Engineering, NM, USA, pp. 1-8, 2009.
3 Glinz, M., Berner, S., and Joos, S., "Object oriented modeling with ADORA." Information Systems, vol. 27, Issue 6, pp. 425-444, 2002.   DOI   ScienceOn
4 US-CERT, Multiple DNS implementations vulnerable to cache poisoning, Vulnerability Note VU#800113, United States Computer Emergency Readiness Team, 2008.
5 Householder, A and King, B, Securing an Internet Name Server, $CERT^{{\circledR}}$Coordination Center, 2002.
6 IEEE, Software verification and validation, IEEE Std. 1012-2004, pp. 5-11, 2004.
7 Mogyorodi, G., "Requirement-based Testing: An Overview," Proc. of the 39th International Conference and Exhibition on Technology of Object-oriented Languages and Systems, CA, USA, pp. 286-295, 2001.
8 Security Associates Institute, Attacking the DNS Protocol- Security Paper v2, SAI, 2003.
9 Seybold, C. and Meier, S., "Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models," Proc. of the 12th Asia-Pacific Software Engineering Conference, Taipei, Taiwan, pp. 408-420, 2005.
10 Tsai, W., Chen, Y., and Paul, R., "Specification-Based Verification and Validation of Web Services and Serviceoriented Operating Systems," Proc. of the 10th IEEE International Workshop on Object-oriented Real-Time Dependable Systems, AZ, USA, pp. 139-147, 2005.
11 IEEE, Guide for developing system requirements specifications, IEEE Std. 1233-1998, IEEE, 1998.
12 IEEE, Glossary of software engineering terminology, IEEE Std. 610.12-1990, IEEE, pp. 80, 1990.