期刊文献+

AADL进程子集行为语义研究 被引量:1

Research on Behavioral Semantics for the Subset of the AADL Process
在线阅读 下载PDF
导出
摘要 AADL是一种基于组件的半形式化建模语言,采用结构化方法对大型复杂软件系统的软硬件进行统一建模,有效描述系统的功能行为、非功能属性以及运行时的体系结构动态演化,但其许多问题需要进一步研究与完善。本文首先分析了AADL形式语义研究现状,然后定义了AADL进程子集的形式语言,建立了AADL进程子集通信模型,通过对事件的形式化定义和分析体现了事件在系统状态转变过程中的重要作用,对AADL进程子集行为语义进行了研究。与相关研究成果的对比说明了本文的优势。本文为AADL语言及其形式语义的发展提供了一种有益的参考,进一步完善大型复杂软件系统体系结构建模与分析技术。 AADL is a semi-formal modeling language based on components,which models software and hardware for large-scale complex software systems uniformly by structured description,and describes effectively system functional behaviors,non-functional attributes and architecture dynamic evolution in run-time,but some questions of AADL are required to further stduy and improve.This paper analyzes firstly the status quo of research for the AADL formal semantics,defines the formal language for the subset of the AADL process,makes a communication model for the subset of the AADL process,defines the concept of event formally,and clarifies the important role of event during the system status transformation,studies the behavioral semantics for the subset of the AADL process,and finally illustrates our advantages by contrasting with other literatures.This paper provides beneficial consultation for the development of AADL and its formal semantics and further improves the technology of architecture modeling and analysing for large-scale complex software systems.
出处 《计算机工程与科学》 CSCD 北大核心 2012年第7期93-98,共6页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61103038) 广东省教育部产学研结合项目(2010B050800038) 韶关学院科研项目(201020704)
关键词 行为语义 形式语言 AADL 事件 体系结构 behavioral semantics formal language AADL event architecture
  • 相关文献

参考文献18

  • 1Feiler P H,Lewis B A,Vestal S. The SAE Architecture Analysis & Design Language(AADL)-A Standard for Engineering Performance Critical Systems[A].2006.1206-1211.
  • 2SAE Aerospace. SAE AS5506A:Architecture Analysis and Sesign Language v2.0[EB/OL].http://www.sae.org/technical/standards/AS5506A,2011.
  • 3Clavel M,Duran F,Eker S. All about Maude-A High-Performance Logical Framework[M].Berlin:SpringerVerlag,How to Specify,Program and Verify Systems in Rewriting Logic,2007.
  • 4杨志斌,皮磊,胡凯,顾宗华,马殿富.复杂嵌入式实时系统体系结构设计与分析语言:AADL[J].软件学报,2010,21(5):899-915. 被引量:79
  • 5董云卫,王广仁,张凡,高磊.AADL模型可靠性分析评估工具[J].软件学报,2011,22(6):1252-1266. 被引量:33
  • 6Olveczky P C,Boronat A,Meseguer J. Formal Semantics and Analysis of Behavioral AADL Models in Real-Time Maude[R].Urbana-Champaign,USA:Department of Computer Science,University of Illinois at Urbana-Champaign,2010.1-38.
  • 7Romero J R,Rivera J E,Duran F. Formal and Tool Support for Model Driven Engineering with Maude[J].Journal of Object Technology,2007,(09):187-207.
  • 8Clavel M,Egea M. ITP/OCL:A Rewriting-Based Validation Tool for UML+OCL Static Class Diagrams[A].2006.368-373.
  • 9Yang Z B,Hu K,Boderveix J P. Two Formal Semantics of a Subset of the AADL[A].2011.344-349.
  • 10Pi L,Yang Z B,Bodeveix J P. A Comparative Study of FIACRE and TASM to Define AADL Real Time Concepts[A].2009.347-352.

二级参考文献97

  • 1Fersman E,Pettersson P,Wang Y.Timed automata with asynchronous processes:Schedulability and decidability.In:Proc.of the TACAS 2002.Berlin:Springer-Verlag,2002.67-82.
  • 2Harbour MG,García JJG,Gutiérrez JCP,Moyano JMD.MAST:Modeling and analysis suite for real-time applications.In:Proc.of the 13th Euromicro Conf.on Real-Time Systems.Washington:IEEE Computer Society Press,2001.125-134.
  • 3Jürjens J.Towards development of secure systems using UMLsec.In:Proc.of the 4th Int'l Conf.on Fundamental Approaches to Software Engineering.London:Springer-Verlag,2001.187-200.
  • 4Bodeveix JP,Cavallero R,Chemouil D,Filali M,Rolland JF.A mapping from AADL to Java-RTSJ.In:Proc.of the 5th Int'l Workshop on Java Technologies for Real-Time and Embedded Systems.New York:ACM Press,2007.165-174.
  • 5Jahier E,Halbwachs N,Raymond P,Nicollin X,Lesens D.Virtual execution of AADL models via a translation into synchronous programs.In:Proc.of the 7th ACM & IEEE Int'l Conf.on Embedded Software.New York:ACM Press,2007.134-143.
  • 6Hamid I,Zalila B,Najm E,Hugues J.Automatic framework generation for hard real-time applications.Innovations in Systems and Software Engineering:A NASA Journal,2008,4(1):107-122.[doi:10.1007/s11334-008-0044-5].
  • 7Zalila B,Pautet L,Hugues J.Towards automatic middleware generation.In:Proc.of the 11th IEEE Int'l Symp.on Object-Oriented Real-Time Distributed Computing.Washington:IEEE Computer Society Press,2008.221-228.
  • 8Vergnaud T,Hugues J,Pautet L,Kordon F.PolyORB:A schizophrenic middleware to build versatile reliable distributed applications.In:Proc.of the 9th Int'l Conf.on Reliable Software Technologies Ada-Europe 2004.Berlin:Springer-Verlag,2004.106-119.
  • 9The assert-project final report.2007.http://www.assert-project.net.
  • 10OMG.Systems Modeling Language V1.0.2007.http://www.omg.org/cgi-bin/doc-formal/2007-09-01.

共引文献179

同被引文献43

  • 1任江春,王志英,戴葵.一种新的进程可信保护方法[J].武汉大学学报(理学版),2006,52(5):532-536. 被引量:3
  • 2全国信息安全标准化技术委员会.GB/Z 24294,基于互联网电子政务信息安全实施指南[S].2009.
  • 3BENALOH J( CHASE M, HORVITZ E, et al. Patient controlled en-cryption :ensuring privacy of electronic medical records [C] //Proc ofACM Workshop Cloud Computing Security. New York: ACM Press,2009:103-114.
  • 4DONG Chang-yu, RUSSELLO G, DULAY N. Shared and searchableencrypted data for untrusted servers [C] //Proc of the 22nd Confe-rence on Data and Applications Security. Berlin : Springer, 2008 : 127-143,.
  • 5SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Ad-vances in Cryptology. Berlin: Springer, 2005:457-473.
  • 6GOYAL V, PANDEY 0,SAHAI A, et al. Attribute-based encryp-tion for fine-grained access control of encrypted data[C]//Proc of the13th ACM Conference on Computer and Communications Security.New York:ACM Press, 2006:89-98.
  • 7BETHENCOURT J, SAHAI A,WATERS B. Ciphertext-policy attri-bute-based encryption [C] //Proc of IEEE Symposium on Security andPrivacy. Washington DC:IEEE Computer Society, 2007:321-334.
  • 8CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE[C]//Proc of the 14th ACM Conference on Computer and Communi-cations Security. New York:ACM Press, 2007:456-465.
  • 9GOYAL V, JAIN A, PANDEY 0,et al. Bounded ciphertext policyattribute based encryption [C] //Proc of the 35 th International Collo-quium on Automata, Languages and Programming. Berlin.. Springer,2008:579-591.
  • 10YU Shu-cheng, WANG Cong, REN Kui, et al. Attribute based datasharing with attribute revocation [C] //Proc of the 5th ACM Symposi-um on Information, Computer and Communications Security. NewYork:ACM Press, 2010.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部