Learn More
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current(More)
This management summary briefly describes the aims, the conduct, and the mos t salient conclusions and recommendations of the study entitled "Life-Cycle Support in the Ada Environment" . The study was performed by Systems Designer s Limited and TECSI-Software and was sponsored by the Commission of th e European Communities under the Multi-Annual Data(More)
During software certification various forms of testing (e.g., unit, integration, regression) are undertaken. These testing processes are very important, but are also generally accepted as expensive, leading to a desire to replace testing with more cost-effective processes, where practicable. This paper is concerned with how such technology substitution can(More)
Current trends show that in the near future we will see the emergence of integrated safety related electronic systems that will be able to share a multiplicity of sensor data over a common computing infrastructure to provide new functions that will improve the active safety of vehicles. Such systems will include driver assistance systems such as (the so(More)
The degree of flexibility brought to the next generation of aircraft by integrated modular avionics (IMA) concept potentially enables dynamic reconfiguration of the avionics systems, e.g. as a means of fault containment. So far, most of the research in this field has focused on real-time task scheduling and dynamic resource (re)allocation. In this paper, we(More)
We present an approach to the integration of the quantitative and qualitative aspects of safety assessment to facilitate the certification of complex systems using a quantitative criteria. The approach is based on documenting all of all of the relevant safety factors in a system safety case and then transitioning all of the qualitative factors to(More)
Fundamental to the success of a product-line strategy is having some means to attain the global architecture that all products will share. Migrating to the architecture is often perceived as a difficult part of implementing the strategy. However, the technique presented here permits a low-risk, incremental development of the architecture via a process of(More)
Following our experience in the development of ExOS, the RTAI/Linux-based real-time operating system for the planetary rover ExoMaDeR, we realized that the management of onboard software configuration requires more powerful capabilities than those currently available, especially to react autonomously and in real-time to unexpected events, e.g. faults.(More)
ion hierarchies are a human invention intended to assist people in mastering the complexity of systems by ignoring unnecessary details. They determine successive levels of granularity of observation at which system properties can be studied. Theory should allow predicting how properties at some level are reflected upstream or downstream in the hierarchy. In(More)