FASE 2002: Fundamental Approaches to Software Engineering pp 264-278 | Cite as
Formal Requirements Engineering Using Observer Models
Conference paper
First Online:
Abstract
Today we are confronted with an enormous variety of formal software engineering approaches and tools. Among these are many that address the critical early stages of software development. However, only little attention has been paid to the integration of different specialised approaches and to the overall development process.
In this paper we present a technique for formal requirements analysis (observer models) that deals with particular perspectives on a system rather than with particular aspects of it.
A realistic gasburner example illustrates the overall approach.
Keywords
Hybrid Automaton Observer Model Faulty Sensor Observer Component Computer Security Foundation Workshop
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download
to read the full conference paper text
References
- 1.Martín Abadi and Leslie Lamport. The Existence of Refinement Mappings. Theoretical Computer Science, 82(2):253–284, May 1991.MATHCrossRefMathSciNetGoogle Scholar
- 2.R. Alur, C. Courcoubetis, N. Halbwachs, T. A. Henzinger, P.-H. Ho, X. Nicollin, A. Olivero, J. Sifaksi, and S. Yovine. The algorithmic analysis of hybrid systems. Theoretical Computer Science, 138:3–34, 1995.MATHCrossRefMathSciNetGoogle Scholar
- 3.R. Alur and D. L. Dill. A theory of timed automata. Theoretical Computer Science, 126:183–235, 1994.MATHCrossRefMathSciNetGoogle Scholar
- 4.T. A. Henzinger and P.-H. Ho. HyTech: The cornell hybrid technology tool. In P. Antsaklis, A. Nerode, W. Kohn, and S. Sastry, editors, Hybrid Systems II, pages 265–293. Springer Verlag, Lecture Notes in Computer Science, vol. 999, 1995.Google Scholar
- 5.D. Hutter, B. Langenstein, J. H. Siekmann C. Sengler, W. Stephan, and A. Wolpers. Deduction in the verification support environment (vse). In Formal Methods Europe (FME), LNCS. Springer, 1996.Google Scholar
- 6.Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, and Kurt Stenzel. VSE: Controlling the complexity in formal software developments. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Proceedings Current Trends in Applied Formal Methods, FM-Trends 98, Boppard, Germany, 1999. Springer-Verlag, LNCS 1641.Google Scholar
- 7.U. Institute and o Standards. Common criteria for information technology security evaluation, 1999.Google Scholar
- 8.Heiko Mantel. Possibilistic definitions of security— an assembly kit. In Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000. IEEE Computer Society Press.Google Scholar
- 9.Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113–131, 1996.MATHCrossRefGoogle Scholar
- 10.Jonathan K. Millen. CAPSL: Common authentication protocol specification language. The MITRE Corporation, Technical Report MP 97B48, 1997. http://www.csl.sri.com/~millen/capsl.
- 11.A. Nonnengart, G. Rock, and W. Stephan. Expressing Realtime Properties in VSEII. In ESA Workshop on On-Board Autonomy, volume WPP-191, pages 447–454, October 2001.Google Scholar
- 12.A. Nonnengart, G. Rock, and W. Stephan. Using Hybrid Automata to Express Realtime Properties in VSE-II. In Ingrid Russel and John Kolen, editors, Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference, pages 640–644. AAAI Press, 2001.Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2002