• Title/Summary/Keyword: Z/Eves

Search Result 8, Processing Time 0.029 seconds

A Formal Specification and Accuracy Checking of 2+1 View Integrated Metamodel Using Z and Object-Z (Z/Object-Z 사용한 2+1 View 통합 메타모델의 정형 명세와 명확성 검사)

  • Song, Chee-Yang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.449-459
    • /
    • 2014
  • The proposed 2+1 view integrated metamodel defined formerly with a graphical class model can not be guaranteed the syntactic clarity and accuracy precisely for the metamodel due to the informal specification. This paper specifies the syntactic semantics formally for the 2+1 view integrated metamodel using Z and Object-Z and checks the accuracy of the metamodel with Z/Eves tool. The formal specification is expressed in Z and Object-Z schema separately for syntax and statics semantics of the 2+1 view integrated metamodel, which applying the converting rule between class model and Z/Object-Z. The accuracy of the Z specification for the metamodel is verified using Z/Eves tool, which can check the syntax, type, and domain of the Z specification. The transformation specification and checking of the 2+1 view integrated metamodel can help establish more accurate the syntactic semantics of its construct and check the accuracy of the metamodel.

A Security Software Development Methodology Using Formal Verification Tools (정형 검증 도구를 이용한 보안 소프트웨어 개발 방안)

  • Jang, Seung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.141-148
    • /
    • 2006
  • This paper suggests method of safe security S/W by verifying and its result of formal verification tool. We will survey many formal verification tools and compare features of these tools. And we will suggest what tool is appropriate and methodogoly of developing safe security S/W. The Z/EVES is the most appropriate tool. This paper proposes formal verification of ACS by using RoZ tool which is formal verification tool to create UML model. The specification and verification are executed using Z/EVES tool. These procedures can find weak or wrong point of developed S/W.

A Formal Specification and Checking Technique of Feature model using Z language (휘처 모델의 Z 정형 명세와 검사 기법)

  • Song, Chee-Yang;Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.123-136
    • /
    • 2013
  • The Feature model can not be guaranteed the syntactic accuracy of its model and be difficult the validation using automatic tool for its syntax, because this model is expressed by a graphical and informal structure in itself. Therefore, there is a need to formalize and check for the feature model, to precisely define syntax for construct of the model. This paper presents a Z formal specification and a model checking mechanism of the feature model to guarantee the correctness of the model. It first defines the translation rules between feature model and Z, and then converts the syntax of the feature model into the Z schema specification by applying these rules. Finally, the Z schema specification is checked syntax, type, and domain errors using the Z/Eves validation tool to assure the correctness of its specification, With the use of the proposed method, we may express more precisely the construct of the feature model. Moreover the domain analyst are able to usefully verify the errors of the generated feature model.

A Formal Specification of Reusable Framework of Embedded System (임베디드 시스템의 재사용 프레임워크에 대한 정형명세)

  • Cho, Eun-Sook;Kim, Chul-Jin;Song, Chee-Yang
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.431-442
    • /
    • 2010
  • Because embedded system is combined system of hardware and software, we should design by considering elements such as real-time, reactive, small size, low weight, safe, reliable, harsh environment, low cost, and so on. However, those are poorly reflected on current embedded system development. Especially, there is few existed framework-based embedded system development. As a result, there are many internal codes which is not related with system operation in currently developed embedded system, and reusability or variability is not considered into embedded system development. Therefore we propose a formal specification technique using Z language to guarantee completeness or consistency of design of reusability framework proposed for improving reusability of embedded system. Also we assure correctness of framework design by checking Z model through Z-Eves Tool.

A Formal Specification and Meta-Model for Development of Cooperative Collection·Analysis Framework

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.85-92
    • /
    • 2019
  • Companies can identify user groups or consumption trends by collecting and analyzing opinions of many users on special subjects or their products as well as utilize them as various purposes such as predicting some specific trends or marketing strategies. Therefore current analyzing tools of social media have come into use as a means to measure the performances of social media marketing through network's statistical analysis. However these tools require expensive computing and network resources including burden of costs for building up and operating complex software platforms and much operating know-how. Hence, small companies or private business operators have difficulty in utilizing those social media data effectively. This paper proposes a framework applied into developing analysis system of social media. The framework could be set up and operate the system to extract necessary social media's data. Also to design the system, this study suggests a meta-model of proposed framework and to guarantee completeness and consistency, a formal specification of meta-model by using Z language is suggested. Finally, we could verify the clearness of framework's design by performing Z model checking of formal specification's output through Z-EVES tool.

Study on Z specification for S/W Safety of Computer Based Interlocking Systems (전자연동장치 S/W 안전성 확보를 위한 Z 방법표현에 관한 연구)

  • Ahn, Jin;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.1
    • /
    • pp.55-63
    • /
    • 2017
  • Railway interlocking systems which are safety-critical systems are rapidly changed from relay-based systems to computer-based systems which have high flexible. Computer-based interlocking systems (CBI) are consisted of hardware and software in which system safeties arise one of important problems. The interlocking software of the CBI influences directly to the system safeties. "z" notation is one of formal methods have been used for system software specification to secure system safety. In this paper, the specification of interlocking logics for CBI systems is realized using "z" notation and verifies it with Z/EVES.

Study on Highly Reliable Drone System to Mitigate Denial of Service Attack in Terms of Scheduling (고신뢰 드론 시스템을 위한 스케줄링 측면에서의 서비스 거부 공격 완화 방안 연구)

  • Kwak, Ji-Won;Kang, Soo-Young;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.821-834
    • /
    • 2019
  • As cyber security threats increase, there is a growing demand for highly reliable systems. Common Criteria, an international standard for evaluating information security products, requires formal specification and verification of the system to ensure a high level of security, and more and more cases are being observed. In this paper, we propose highly reliable drone systems that ensure high level security level and trust. Based on the results, we use formal methods especially Z/EVES to improve the system model in terms of scheduling in the system kernel.

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.