Skip to main content

Validating Safety and Security Requirements for Partitioned Architectures

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNPSE,volume 5570)

Abstract

Design and validation of safety-critical systems are crucial because faults or security issues could have significant impacts (loss of life, mission failure, etc.). Each year, millions of dollars are lost due to these kinds of issues. Consequently, safety and security requirements must be enforced. Systems must be validated against these requirements to improve safety and security and to make them more reliable and robust. We present our approach to avoid such issues by modeling safe and secure systems with both safety and security requirements. We rely on a modeling language (AADL) to model and design partitioned systems with their requirements and constraints. We then validate these models to ensure security and safety enforcement. We also discuss how this approach can be used to automatically generate and build safe and secure partitioned systems.

Keywords

  • Security Policy
  • Security Requirement
  • Security Level
  • Address Space
  • Covert Channel

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-01924-1_3
  • Chapter length: 14 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   74.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-01924-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   99.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rushby, J.: Partitioning for avionics architectures: Requirements, mechanisms, and assurance. NASA Contractor Report CR-1999-209347, NASA Langley Research Center (1999)

    Google Scholar 

  2. Airlines Electronic Engineering: ARINC Specification 653 (2003)

    Google Scholar 

  3. Alves-Foss, J., Harrison, W.S., Oman, P., Taylor, C.: The MILS Architecture for High-Assurance Embedded Systems. International journal of embedded systems (2005)

    Google Scholar 

  4. National Institute of Standards and Technology (NIST): The economic impacts of inadequate infrastructure for software testing. Technical report (2002)

    Google Scholar 

  5. SAE: Architecture Analysis & Design Language v2.0 (AS5506) (September 2008)

    Google Scholar 

  6. Rugina, A.E., Feiler, P.H., Kanoun, K., Kaaniche, M.: Software dependability modeling using an industry-standard architecture description language. In: Proceedings of 4th European Congress ERTS, Toulouse (January 2008)

    Google Scholar 

  7. Frank Singhoff, A.P.: AADL Modeling and Analysis of Hierarchical Schedulers. In: ACM SIGAda Ada Letters (2007)

    Google Scholar 

  8. Rushby, J.: The design and verification of secure systems. In: Eighth ACM Symposium on Operating System Principles (SOSP), Asilomar, CA (December 1981)

    Google Scholar 

  9. Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. Technical report, The MITRE Corporation (1976)

    Google Scholar 

  10. Rushby, J.: The Bell and La Padula Security Model. Computer Science Laboratory, SRI International, Menlo Park, CA (1986); Draft Technical Note

    Google Scholar 

  11. Biba, K.J.: Integrity considerations for secure computer systems. Technical report, MITRE

    Google Scholar 

  12. Kalkowski, S.: Security policies in Nizza on top of L4.sec. PhD thesis, University of Technology Dresden (2006)

    Google Scholar 

  13. Feiler, P.H., Gluch, D.P., Hudak, J.J.: The Architecture Analysis and Design Language (AADL): An introduction. Technical report (2006)

    Google Scholar 

  14. Frana, R., Bodeveix, J.P., Filali, M., Rolland, J.F.: The AADL behaviour annex – experiments and roadmap. Engineering Complex Computer Systems, 377–382 (2007)

    Google Scholar 

  15. Zalila, B., Hugues, J., Pautet, L.: Ocarina user guide. TELECOM ParisTech

    Google Scholar 

  16. Delange, J., Pautet, L., Kordon, F.: Code Generation Strategies for Partitioned Systems. In: 29th IEEE Real-Time Systems Symposium (RTSS 2008). IEEE Computer Society Press, Los Alamitos (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Delange, J., Pautet, L., Feiler, P. (2009). Validating Safety and Security Requirements for Partitioned Architectures. In: Kordon, F., Kermarrec, Y. (eds) Reliable Software Technologies – Ada-Europe 2009. Ada-Europe 2009. Lecture Notes in Computer Science, vol 5570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01924-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01924-1_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01923-4

  • Online ISBN: 978-3-642-01924-1

  • eBook Packages: Computer ScienceComputer Science (R0)