• Title/Summary/Keyword: Z specification

Search Result 61, Processing Time 0.026 seconds

Study on Highly Reliable Drone System to Mitigate Denial of Service Attack in Terms of Scheduling (고신뢰 드론 시스템을 위한 스케줄링 측면에서의 서비스 거부 공격 완화 방안 연구)

  • Kwak, Ji-Won;Kang, Soo-Young;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.821-834
    • /
    • 2019
  • As cyber security threats increase, there is a growing demand for highly reliable systems. Common Criteria, an international standard for evaluating information security products, requires formal specification and verification of the system to ensure a high level of security, and more and more cases are being observed. In this paper, we propose highly reliable drone systems that ensure high level security level and trust. Based on the results, we use formal methods especially Z/EVES to improve the system model in terms of scheduling in the system kernel.

Effective Human Resource Management through knowledge based systems and formal methods (지식베이스 시스템과 형식 방법을 이용한 효과적인 인적자원 관리)

  • 서의호;변대호
    • Korean Management Science Review
    • /
    • v.10 no.2
    • /
    • pp.145-161
    • /
    • 1993
  • Human Resource Management (HRM) performs numerous activities in organizations including employee recruitment, selection, placement, job analysis, training and development, and labor relations. POSCO (Pohang Steel Company) has concerned with employee management related to job placement and analysis among these activities because of the problems of over-complexity of placement precedures for the variety of recruits, the frequency of selection, a large amount of job descriptions / specifications, and their changes. This study, as a phase of developing the entire HRM systems in the organization, briefly summarizes the preliminary information related and describes an implementation of expert system as a means for effective job placement based on the principle of right-person-in-right-place with identifying aptitudes and personalities of employees. Thus, a new approach for developing a job description/specification using a formal specification language like Z is also proposed. The result of this study will cultivate the performance of personnel, prevent conflicts between labor and management, promote overall productivity of organization, as well as helpfully verify job analysis.

  • PDF

A Formal Specification Translation of the Class Diagram (클래스 다이아그램의 정형 명세 변환)

  • Kim, Jin-Soo;Jeong, Je-Hong;Kim, Byung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1009-1012
    • /
    • 2001
  • 일반적으로 크고 복잡한 소프트웨어 시스템은 커다란 다이아그램의 집합으로 구성되지만 이들 각각의 다이아그램들이 일관성이 있고 완전한가를 알기는 매우 어렵다. 이러한 문제를 해결하기 위하여 [1]에서는 최근 객체지향 개발에서 많이 사용되고 있는 UML 다이아그램들에 대한 일관성과 완전성을 검사하기 위하여 각 다이아그램들을 ER 모델로 표현하고, 각 다이아그램에 대한 공통된 표현으로 통합된 ER 다이아그램을 제공하였다. 이렇게 통합된 다이아그램은 일편의 집합과 함수들을 사용하여 정형적으로 명세되며, 이러한 정형 명세를 기반으로하여 일관성과 완전성 검사를 수행하기 위한 규칙을 제공하였다. 그러나 [1]에서 정형적으로 명세된 집합과 함수를 실제로 사용하기 위해서는 우리가 알고있는 정형 명세 언어로 변환할 필요성이 있다. 따라서 본 논문에서는 이러한 집합을 추상자료형으로 명세하여 정의하고, 추상자료형으로 표현된 명세를 우리가 잘 알고 있는 Z 명세로 변환하여 검증 도구를 설계하는 기초로 사용하고자 한다. Z 명세는 쉽게 실행가능한 형태로 변환되어 검증 시스템을 구축할 수 있게 된다.

  • PDF

Interpretation of Alloy Model for Mobile IPv6 (모바일 IPv6의 Alloy모델 해석)

  • 박승순;배민오;김영인
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.115-117
    • /
    • 2002
  • 본 논문에서는 Mobile IPv6에 사이클이 있음을 Alloy로 명세(specification)하고 Alloy 분석기로 검증(verification)한 것을 해석해 보겠다. Acyclicity를 만족하지 못함으로 해서 모바일호스트는 이동을 하지 못하고 계속 사이클을 돌게 된다. Alloy는 Rational의 UML과 같은 객체모델링 언어인데, 일차논리와 집합에 기반을 둔 Z에서부터 파생되었다. Alloy는 작은 모델들을 위한 명세 언어로, Alloy 모델은 그래픽과 텍스트를 모두 지원한다. Alloy로 명세 된 것을 쉽게 분석 할 수 있는 검증도구로 Alloy 분석기가 있는데, 이러만 도구를 이용함으로써 손쉽고 빠르게 검증을 할 수 있다.

  • PDF

Testing Web Program Using Formal Specification (정형적 명세를 이용한 웹 프로그램의 테스트)

  • Ahn, Young-Hee;Choi, Eun-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.2115-2118
    • /
    • 2002
  • 이 논문에서는 정형적 명세를 이용하여 테스트 데이터를 추출하는 방법을 제안한다. 복잡하고 구성요소가 다양한 웹 프로그램의 기능을 Object-Z 정형 명세 언어를 이용하여 핵심적으로 나타낸다. 이로부터 상태 모델을 구성하고 최상위 레벨의 STD 에서 세부적으로 STD 를 추가하여 테스트 시나리오를 추출한다. 실험 대상은 웹 뱅킹 업무로 정하고 계좌개설 과정의 테스트 데이터를 추출하였다. 제안한 방법은 사용기반 테스트 기법과 결합하여 웹 소프트웨어의 테스트 자동화에 중요한 요소가 될 것이다.

  • PDF

The Effect of Link Length Variation on the Workspace of a Robot Arm (로봇 링크길이의 변화가 작업공간에 미치는 영향)

  • Choe, Byeong-O
    • 연구논문집
    • /
    • s.24
    • /
    • pp.13-26
    • /
    • 1994
  • The choice of design parameters for a robot arm depends on the desired workspace, load lifting capacity, application requirements, and the performance of the robot. The inverse process, which is the determination of a single robot's workspace for a given specification is also a common practice and is as important to the designers as it is to the users. Based on the geometric influence coefficients, the workspace areas on the vertical Y-Z plane are investigated and calculated. Using these areas, the effects of link parameters, link length ratios and joint rotation angles, are investigated.

  • PDF

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.

As tudy on the underwater stability according to the composition of the sea anchor (씨앵커의 구성에 따른 수중 안정성에 관한 연구)

  • Jung-Mo, JUNG;Hyung-Seok, KIM
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.58 no.4
    • /
    • pp.289-298
    • /
    • 2022
  • Sea anchor for fishery is commonly used in jigging fishery and purse seine. The study of sea anchor was studied for improvement of opening efficiency and drag by changing the type of shape and the diameter of vent. However, standard specification of sea anchor is not set and has not been studied for underwater stability. Therefore, this study aimed to improve underwater stability of sea anchor by changing a vent diameter and weight of sinker. The experiment was conducted in flume water tank. The experiment model of sea anchor was made from actual model of sea anchor which is used in fishery by similarity law. The model of sea anchor was designed to different types of vent diameter and weight of sinker in different current speed. The value of movement of side to side (X-axis), drag of sea anchor (Y-axis) and movement of up and down (Z-axis) was measured for 30 seconds. Each value of X, Y, Z-axis was analyzed through t-test and ANOVA analysis to verify that each value had a significant difference according to the difference compositions. There was correlation between the movement of X-axis and Z-axis. The drag of sea anchor was stronger as the current speed increased. However, the larger the vent diameter, the weaker the drag. From the result of the standard deviation, the movement of X-axis was inversely proportional to the vent diameter. However, movement of Z-axis was larger as the weight of sinker was the heaviest or lightest from the result of the standard deviation. These results suggest that the sea anchor should be combined with proper size of the vent diameter and the weight of sinker to improve the stability.

Comparison of Major Black-Box Testing Methods in Object-Oriented Software (객체지향 소프트웨어를 위한 주요 블랙박스 테스트 기법들의 비고)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • As the size of software is getting huge, it has been impossible for testers to test all of source coed. Therefore, the method which uses information of requirements for testing has been researched and accepted. Although there are a lot of test methods based on requirement specification, each method has a different approach and coverage. So we should consider their various approach and coverage in the stage of test planning. This paper presents the empirical comparison and the result by applying various black-box testing methods to software system. For this experiment we studied five black-box testing methods including UML based specification technique. We applied the five testing methods to application system and evaluated the coverage of extracted test case.