Formal Requirements Engineering Using Observer Models

  • Andreas Nonnengart
  • Georg Rock
  • Werner Stephan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2306)

Abstract

Today we are confronted with an enormous variety of formal software engineering approaches and tools. Among these are many that address the critical early stages of software development. However, only little attention has been paid to the integration of different specialised approaches and to the overall development process.

In this paper we present a technique for formal requirements analysis (observer models) that deals with particular perspectives on a system rather than with particular aspects of it.

A realistic gasburner example illustrates the overall approach.

Keywords

Hybrid Automaton Observer Model Faulty Sensor Observer Component Computer Security Foundation Workshop 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Martín Abadi and Leslie Lamport. The Existence of Refinement Mappings. Theoretical Computer Science, 82(2):253–284, May 1991.MATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    R. Alur, C. Courcoubetis, N. Halbwachs, T. A. Henzinger, P.-H. Ho, X. Nicollin, A. Olivero, J. Sifaksi, and S. Yovine. The algorithmic analysis of hybrid systems. Theoretical Computer Science, 138:3–34, 1995.MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    R. Alur and D. L. Dill. A theory of timed automata. Theoretical Computer Science, 126:183–235, 1994.MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    T. A. Henzinger and P.-H. Ho. HyTech: The cornell hybrid technology tool. In P. Antsaklis, A. Nerode, W. Kohn, and S. Sastry, editors, Hybrid Systems II, pages 265–293. Springer Verlag, Lecture Notes in Computer Science, vol. 999, 1995.Google Scholar
  5. 5.
    D. Hutter, B. Langenstein, J. H. Siekmann C. Sengler, W. Stephan, and A. Wolpers. Deduction in the verification support environment (vse). In Formal Methods Europe (FME), LNCS. Springer, 1996.Google Scholar
  6. 6.
    Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, and Kurt Stenzel. VSE: Controlling the complexity in formal software developments. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Proceedings Current Trends in Applied Formal Methods, FM-Trends 98, Boppard, Germany, 1999. Springer-Verlag, LNCS 1641.Google Scholar
  7. 7.
    U. Institute and o Standards. Common criteria for information technology security evaluation, 1999.Google Scholar
  8. 8.
    Heiko Mantel. Possibilistic definitions of security— an assembly kit. In Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000. IEEE Computer Society Press.Google Scholar
  9. 9.
    Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113–131, 1996.MATHCrossRefGoogle Scholar
  10. 10.
    Jonathan K. Millen. CAPSL: Common authentication protocol specification language. The MITRE Corporation, Technical Report MP 97B48, 1997. http://www.csl.sri.com/~millen/capsl.
  11. 11.
    A. Nonnengart, G. Rock, and W. Stephan. Expressing Realtime Properties in VSEII. In ESA Workshop on On-Board Autonomy, volume WPP-191, pages 447–454, October 2001.Google Scholar
  12. 12.
    A. Nonnengart, G. Rock, and W. Stephan. Using Hybrid Automata to Express Realtime Properties in VSE-II. In Ingrid Russel and John Kolen, editors, Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference, pages 640–644. AAAI Press, 2001.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Andreas Nonnengart
    • 1
  • Georg Rock
    • 1
  • Werner Stephan
    • 1
  1. 1.German Research Centre for Artificial IntelligenceSaarbrückenGermany

Personalised recommendations