Software credibility requirement extraction method based on control use cases
An extraction method and credibility technology, which is applied in the field of software credibility requirements extraction based on control cases, can solve problems such as inability, invisible to users, and analysis of software system credibility requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0016] figure 1 It is a schematic diagram of the feedforward-feedback control model of a trusted software system. In the trusted software system 1 (hereinafter referred to as software system 1 or system 1), the controlled object is the core system 4 of the trusted software system 1, and the core system 4 provides all the Services, which expose the behavior and performance of a software system. Feedforward controller 2 implements a set of proactive strategies to deal with identified possible threats, while feedback controller 3 implements a set of fault-tolerant strategies to deal with possible deviations in system behavior. The credible software system 1 guarantees the reliability of the services provided by the feedforward controller 2 and the feedback controller 3 respectively through the feedforward and feedback control functions...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 