Unlock instant, AI-driven research and patent intelligence for your innovation.

Software credibility requirement extraction method based on control use cases

An extraction method and credibility technology, which is applied in the field of software credibility requirements extraction based on control cases, can solve problems such as inability, invisible to users, and analysis of software system credibility requirements

Inactive Publication Date: 2013-12-04
PEKING UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the reliability requirements of software systems are not driven by user expectations but by internal or external threats that the software system may encounter, the behavior of some software that the reliability requirements should describe may be It is also invisible to users, so use case technology cannot be effectively used to analyze the credibility requirements of software systems and improve the credibility of software systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software credibility requirement extraction method based on control use cases
  • Software credibility requirement extraction method based on control use cases
  • Software credibility requirement extraction method based on control use cases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0016] figure 1 It is a schematic diagram of the feedforward-feedback control model of a trusted software system. In the trusted software system 1 (hereinafter referred to as software system 1 or system 1), the controlled object is the core system 4 of the trusted software system 1, and the core system 4 provides all the Services, which expose the behavior and performance of a software system. Feedforward controller 2 implements a set of proactive strategies to deal with identified possible threats, while feedback controller 3 implements a set of fault-tolerant strategies to deal with possible deviations in system behavior. The credible software system 1 guarantees the reliability of the services provided by the feedforward controller 2 and the feedback controller 3 respectively through the feedforward and feedback control functions...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software credibility requirement extraction method based on control use cases. The software system functionality requirements which are represented by the use cases are used as a basis, and the method uses the control use cases to represent the credibility requirements of a software system and comprises the following steps: identifying threat and system behavior deviations; evaluating risks; and determining solutions. The method provided by the invention guides requirement analysis personnel to effectively capture and organize the credibility requirements of the software system in the course of extracting the software system requirements to reduce the possibility that the software system brings non-expectation results to environment after being deployed, thereby improving the credibility of the software system.

Description

technical field [0001] The invention relates to a method for extracting the credibility requirements of a software system, in particular to a method for extracting software credibility requirements based on control cases. Background technique [0002] Software systems are increasingly used in many key areas of society, and software systems and their operating environments are becoming more and more complex. On the one hand, due to the complexity of the software, it is becoming more and more difficult to ensure the correctness of the software itself, and the software system may have many inherent defects after deployment; on the other hand, the open and dynamic operating environment also brings problems to the software system. There are more and more external threats, such as environmental changes, malicious attacks, and user operation errors. Regardless of internal defects or external threats, they will affect the software system and make its behavior deviate from the user'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36G06F21/57G06F21/10
Inventor 刘春王越张伟金芝
Owner PEKING UNIV