Supporting multiple levels of criticality

Eric Totel, Jean Paul Blanquart, Yves Deswarte, David Powell

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Current safety-critical embedded systems provide support for increasingly diverse and complex tasks, whose levels of criticality can be extremely different. Rather than validating all software to the highest level of confidence, it is more efficient to focus the validation effort on the most critical components. Consequently, it must be ensured that residual design faults in low criticality software cannot corrupt high criticality components. This paper defines an object-oriented integrity policy which ensures that such a property is enforced. Each object is assigned an integrity level related to its criticality. The policy defines rules to access the object methods so that no object can be corrupted by a lower integrity component. Several sorts of objects are accommodated, enabling safety-critical applications to be designed with great flexibility. This is illustrated by a prototype which is implemented on a CORBA-compliant distributed system.

Original languageEnglish
Title of host publicationDigest of Papers - 28th Annual International Symposium on Fault-Tolerant Computing, FTCS 1998
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages70-79
Number of pages10
ISBN (Electronic)0818684704, 9780818684708
DOIs
Publication statusPublished - 1 Jan 1998
Externally publishedYes
Event28th Annual International Symposium on Fault-Tolerant Computing, FTCS 1998 - Munich, Germany
Duration: 23 Jun 199825 Jun 1998

Publication series

NameDigest of Papers - 28th Annual International Symposium on Fault-Tolerant Computing, FTCS 1998
Volume1998-January

Conference

Conference28th Annual International Symposium on Fault-Tolerant Computing, FTCS 1998
Country/TerritoryGermany
CityMunich
Period23/06/9825/06/98

Fingerprint

Dive into the research topics of 'Supporting multiple levels of criticality'. Together they form a unique fingerprint.

Cite this