Validating safety and security requirements for partitioned architectures

Julien Delange, Laurent Pautet, Peter Feiler

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Design and validation of safety-critical systems are crucial because faults or security issues could have significant impacts (loss of life, mission failure, etc.). Each year, millions of dollars are lost due to these kinds of issues. Consequently, safety and security requirements must be enforced. Systems must be validated against these requirements to improve safety and security and to make them more reliable and robust. We present our approach to avoid such issues by modeling safe and secure systems with both safety and security requirements. We rely on a modeling language (AADL) to model and design partitioned systems with their requirements and constraints. We then validate these models to ensure security and safety enforcement. We also discuss how this approach can be used to automatically generate and build safe and secure partitioned systems.

Original languageEnglish
Title of host publicationReliable Software Technologies - Ada-Europe 2009 - 14th Ada-Europe International Conference on Reliable Software Technologies, Proceedings
Pages30-43
Number of pages14
DOIs
Publication statusPublished - 27 Aug 2009
Externally publishedYes
Event14th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2009 - Brest, France
Duration: 8 Jun 200912 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5570 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2009
Country/TerritoryFrance
CityBrest
Period8/06/0912/06/09

Fingerprint

Dive into the research topics of 'Validating safety and security requirements for partitioned architectures'. Together they form a unique fingerprint.

Cite this