• Title/Summary/Keyword: formal specification

Search Result 222, Processing Time 0.031 seconds

A Formal Specification and Checking Technique of Feature model using Z language (휘처 모델의 Z 정형 명세와 검사 기법)

  • Song, Chee-Yang;Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.123-136
    • /
    • 2013
  • The Feature model can not be guaranteed the syntactic accuracy of its model and be difficult the validation using automatic tool for its syntax, because this model is expressed by a graphical and informal structure in itself. Therefore, there is a need to formalize and check for the feature model, to precisely define syntax for construct of the model. This paper presents a Z formal specification and a model checking mechanism of the feature model to guarantee the correctness of the model. It first defines the translation rules between feature model and Z, and then converts the syntax of the feature model into the Z schema specification by applying these rules. Finally, the Z schema specification is checked syntax, type, and domain errors using the Z/Eves validation tool to assure the correctness of its specification, With the use of the proposed method, we may express more precisely the construct of the feature model. Moreover the domain analyst are able to usefully verify the errors of the generated feature model.

Visual Representation of Temporal Properties in Formal Specification and Analysis using a Spatial Process Algebra (공간 프로세스 대수를 이용한 정형 명세와 분석에서의 시간속성의 시각화)

  • On, Jin-Ho;Choi, Jung-Rhan;Lee, Moon-Kun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.339-352
    • /
    • 2009
  • There are a number of formal methods for distributed real-time systems in ubiquitous computing to analyze and verify the behavioral, temporal and the spatial properties of the systems. However most of the methods reveal structural and fundamental limitations of complexity due to mixture of spatial and behavioral representations. Further temporal specification makes the complexity more complicate. In order to overcome the limitations, this paper presents a new formal method, called Timed Calculus of Abstract Real-Time Distribution, Mobility and Interaction(t-CARDMI). t-CARDMI separates spatial representation from behavioral representation to simplify the complexity. Further temporal specification is permitted only in the behavioral representation to make the complexity less complicate. The distinctive features of the temporal properties in t-CARDMI include waiting time, execution time, deadline, timeout action, periodic action, etc. both in movement and interaction behaviors. For analysis and verification of spatial and temporal properties of the systems in specification, t-CARDMI presents Timed Action Graph (TAG), where the spatial and temporal properties are visually represented in a two-dimensional diagram with the pictorial distribution of movements and interactions. t-CARDMI can be considered to be one of the most innovative formal methods in distributed real-time systems in ubiquitous computing to specify, analyze and verify the spatial, behavioral and the temporal properties of the systems very efficiently and effectively. The paper presents the formal syntax and semantics of t-CARDMI with a tool, called SAVE, for a ubiquitous healthcare application.

A Formal Specification and Meta-Model for Development of Cooperative Collection·Analysis Framework

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.85-92
    • /
    • 2019
  • Companies can identify user groups or consumption trends by collecting and analyzing opinions of many users on special subjects or their products as well as utilize them as various purposes such as predicting some specific trends or marketing strategies. Therefore current analyzing tools of social media have come into use as a means to measure the performances of social media marketing through network's statistical analysis. However these tools require expensive computing and network resources including burden of costs for building up and operating complex software platforms and much operating know-how. Hence, small companies or private business operators have difficulty in utilizing those social media data effectively. This paper proposes a framework applied into developing analysis system of social media. The framework could be set up and operate the system to extract necessary social media's data. Also to design the system, this study suggests a meta-model of proposed framework and to guarantee completeness and consistency, a formal specification of meta-model by using Z language is suggested. Finally, we could verify the clearness of framework's design by performing Z model checking of formal specification's output through Z-EVES tool.

A Survey on Formal Verification Methods (소프트웨어 신뢰성 향상을 위한 정형기법)

  • 주운기;이충호;김중배
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.11a
    • /
    • pp.297-300
    • /
    • 2003
  • This paper considers formal verification methods for enhancing software reliability. The formal method verifies that a software is correctly implemented according to its specification by using a mathematical formalism. This paper presents a partial survey on the formal methods and discusses possible applications for the improved software implementation. Finally, some topics are remarked as further studies.

  • PDF

Formal Verification of Twin Clutch Gear Control System

  • Muhammad Zaman;Amina Mahmood;Muhammad Atif;Muhammad Adnan Hashmi;Muhammad Kashif;Mudassar Naseer
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.151-159
    • /
    • 2024
  • Twin clutch model enables the power-shifts as conventional planetary automatic transmission and eradicates the disadvantages of single clutch trans- mission. The automatic control of the dual clutches is a problem. Particularly to control the clutching component that engages when running in one direction of revolution and disengages when running the other direction, which exchange the torque smoothly during torque phase of the gearshifts on planetary-type automatic transmissions, seemed for quite a while hard to compensate through clutch control. Another problem is to skip gears during multiple gearshifts. However, the twin clutch gear control described in ["M Goetz, M C Levesley and D A Crolla. Dynamics and control of gearshifts on twin clutch transmissions, Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 2005"], a significant improvement in twin clutch gear control system is discussed. In this research our objective is to formally specify the twin clutch gear control system and verify it with the help of formal methods. Formal methods have a high potential to give correctness estimating techniques. We use UPPAAL for formal specification and verification. Our results show that the twin clutch gear control model partially fulfills its functional requirements.

The Operation of Administration Tool for Relatinships Management in the RBAC Security System (RBAC 보안시스템에서 관계관리를 위한 관리도구 동작)

  • 오석균;김성열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.373-377
    • /
    • 1999
  • Role Based Access Control(RBAC) reduces the cost of administering access control policies as well as making the process less error-prone. The administration tool is most important component in the concept of RBAC. The administration tool for the RBAC security system is required the consistency of a relationships between user and role in the RBAC Database. In this paper, we propose formal specification in order to manage user-role and role-role relationships. The proposed formal specification leads to the consistency requirements for the RBAC database which are defined as a set of relationship. This paper can easily derive the implementation of the RBAC administration tool by formal specification of operations.

  • PDF

Analysis of Developing Methodology on the Security Software by Comparing Function for Security Protocol Code Generation Tools (정형명세 기법을 이용한 보안 프로토콜 코드 생성 도구의 보안 소프트웨어 개발 분석)

  • Jang Seung-Ju;Ryu Dae-hyun;Lee Chul-Sool;Park Il-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.47-56
    • /
    • 2004
  • Automatic code generating function for security protocol of SPEAR II and IFAD VDM-SL Toolbox supporting formal specification is presented in this paper. Among the functions of these tools we compare and analyze the aspects of functions, users, operation and code generation. And we suggest direction to the developing of safe security S/W. The automatic code generating function for security protocol gives the direction for developing of the safe secure software in formal specification method.

A Process Algebra Approach for Object Interactions in UML (UML에서 객체 상호작용에 대한 프로세스 대수 접근)

  • 최성운;이영환
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.3_4
    • /
    • pp.202-211
    • /
    • 2003
  • Abstract Formal definitions of syntax and semantics for the static and dynamic models in Object Oriented methods are already defined. But the behavior of interacting objects is not formalized. In this paper, we defined the common behavior of interacting objects in terms of process algebra using sequence diagram in UML and regularized properties of interacting objects. Based on the results, we can develop a formal specification by. using of the object interaction instead of the existence dependency suggested by M. Snoeck and G. Dedene[9].

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

  • Kim, Donald D.
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.172-187
    • /
    • 2021
  • In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.

Specification Technique of EJB-Based Application using Design by Contracts Approach (DbC 접근법을 이용한 EJB 기반 애플리케이션의 명세 기법)

  • 노혜민;유철중
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.12
    • /
    • pp.895-906
    • /
    • 2002
  • Due to increased concern about the distributed web application, the interest in EJB - server-side Java component architecture that enables to make out Business Logic without writing codes related to complicated distributed framework - is also increasing. Despite of these increased interest, However, efforts for reliability of these systems have been insufficient. Thus, in this paper, we propose specification technique for applying DbC approach, which can elevate the reliability of software in the Object-Oriented system development, in writing formal specification of EJB-based application. Through this specification technique, developers can gain reliability in the EJB-based application development.