Computer Science ›› 2020, Vol. 47 ›› Issue (5): 284-294.doi: 10.11896/jsjkx.190600169
• Information Security • Previous Articles Next Articles
TANG Hong-ying, HU Jun, CHEN Shuo, SHI Meng-ye
CLC Number:
[1]JOSHI A,HEIMDAHL M P E,MILLER S P,et al.Model-Based Safety Analysis[J].2006. [2]FRIEDENTHAL S,MOORE A,STEINER R.A Practical Guide to SysML[J].San Francisco Jung Institute Library Journal,2011,17(1):41-46. [3]BATTEUX M,PROSVIRNOVA T,RAUZY A.AltaRica 3.0 language specification[R].AltaRica Association,2015. [4]PROSVIRNOVA T.AltaRica 3.0:a model-based approach forsafety analyses[D].Ecole Polytechnique,2014. [5]PROSVIRNOVA T,BATTEUX M,BRAMERET P A,et al.The AltaRica 3.0 project for model-based safety assessment[J].IFAC Proceedings Volumes,2013,46(22):127-132. [6]SAE.Contiguous aircraft/system development process example:SAE Aerospace Information Report 6110 [S].SAE Internatio-nal,2011. [7]HAUSE M.OMG systems modeling language (OMGSysMLTM) tutorial[J].INCOSE International Symposium,2009,19(1):1840-1972. [8]DELLIGATTI L.SysML Distilled:A Brief Guide to the Systems Modeling Language[M].Addison Wesley,2013:3-10. [9]Object Management Group.XML Metadata Interchange[EB/OL].(2015-06-07)[2019-07-28].http://www.omg.org/technology/documents/formal/xmi.htm. [10]KOTUSEV S.Enterprise architecture:what did we study?[J].International Journal of Cooperative Information Systems,2017,26(4):1730002. [11]GERY E,HAREL D,PALACHI E.Rhapsody:A complete life-cycle model-based development system[C]//International Conference on Integrated Formal Methods.Springer,Berlin,Heidelberg,2002:1-10. [12]RAUZY A B.Guarded transition systems:a new states/events formalism for reliability studies[J].Proceedings of the Institution of Mechanical Engineers,Part O:Journal of Risk and Reliability,2008,222(4):495-505. [13]WOOD L,LE HORS A,APPARAO V,et al.Document object model (dom) level 1 specification[EB/OL].(1998-10-01)[2019-05-10].W3C recommendation.https://www.w3.org/TR/1998/REC-DOM-Level-1-19981001/DOM.pdf. [14]ERICSON C A.Fault tree analysis[C]//System Safety Confe-rence.Florida,1999. [15]System X.The OpenAltaRica Platform-Getting Started[EB/OL].(2017-09-04)[2019-04-23].https://www.openaltarica.fr/docs/The%20OpenAltaRica%20Platform%20-%20Getting%20Started.pdf. [16]ALESSANDRO L,MARK N. ARP4754A/ ED-79A- Guidelines for Development of Civil Aircraft and Systems-Enhancements, Novelties and Key Topics[J].Sae International Journal of Aerospace,2011,4(2):871-879. [17]SAE.Guidelines and methods for conducting the safety assessment process on civil airborne systems and equipment:SAE ARP4761 [S].SAE International,1996. [18]BOZZANO M,CIMATTI A,FERNANDES PIRES A,et al.Formal design and safety analysis of AIR6110 wheel brake system[M]//Computer Aided Verification.Cham:Springer International Publishing,2015:518-535. [19]RAUZY A.Anatomy of an efficient fault tree assessment engine[C]//Proceedings of International Joint Conference PSAM.2012. [20]HELLE P.Automatic SysML-based safety analysis[C]//International Workshop on Model Based Architecting & Construction on Embedded Systems.ACM.2012. [21]GARRO A,TUNDIS A.Enhancing the RAMSAS method for system reliability analysis-an exploitation in the automotive domain[C]//International Conference on Simulation and Mode-ling Methodologies, Technologies and Applications.SCITEPRESS,2012:328-333. [22]MHENNI F,CHOLEY J Y,NGUYEN N.An integrated design methodology for safety critical systems[C]//2016 Annual IEEE Systems Conference (SysCon).Orlando,IEEE,2016. [23]DAVID P,IDASIAK V,KRATZ F.Reliability study of complex physical systems using SysML[J].Reliability Engineering & System Safety,2010,95(4):431-450. [24]IDASIAK V,DAVID P,KRATZ F.Automating the synthesis of AltaRica data-flow models from SysML[M]//Reliability,Risk,and Safety.CRC Press,2009. [25]PARR T J,QUONG R W.ANTLR:a predicated-LL(k) parser generator[J].Software:Practice and Experience,1995,25(7):789-810. |
[1] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[2] | HU De-feng, ZHANG Chen-xi, WANG Shi-tao, ZHAO Qin-pei, LI Jiang-feng. Intelligent Prediction Model of Tool Wear Based on Deep Signal Processing and Stacked-ResGRU [J]. Computer Science, 2021, 48(6): 175-183. |
[3] | WANG Wen-xuan, HU Jun, HU Jian-cheng, KANG Jie-xiang, WANG Hui, GAO Zhong-jie. Test Case Generation Method Oriented to Tabular Form Formal Requirement Model [J]. Computer Science, 2021, 48(5): 16-24. |
[4] | QI Jian, HU Jun, GU Qing-fan, RONG Hao, ZHAN Wan-li, DONG Yan-hong. Class Flattening Method for AltaRica 3.0 Model [J]. Computer Science, 2021, 48(5): 51-59. |
[5] | ZHAN Wan-li, HU Jun, GU Qing-fan, RONG Hao, QI Jian, DONG Yan-hong. Model-based Fault Tree Automatic Generation Method [J]. Computer Science, 2021, 48(12): 159-169. |
[6] | MENG Fan-yi, WANG Ying, YU Hai, ZHU Zhi-liang. Refactoring of Complex Software Systems Research:PresentProblem and Prospect [J]. Computer Science, 2020, 47(12): 1-10. |
[7] | CHEN Shuo, HU Jun, TANG Hong-ying, SHI Meng-ye. Transformation Method for AltaRica3.0 Model to NuSMV Model [J]. Computer Science, 2020, 47(12): 73-86. |
[8] | LU Ye-shan. Common Issues and Case Analysis of System Data Migration [J]. Computer Science, 2019, 46(6A): 412-416. |
[9] | LI Si-jie, WEI Ou, ZHAN Yun-jiao, WANG Li-song. SCR Requirement Model Transformation Based on Table Expression [J]. Computer Science, 2019, 46(6): 180-188. |
[10] | LI Wan-qian, HU Jun, CHEN Song, ZHANG Wei-jun. Method of System Safety Analysis and Verification for SysML Models [J]. Computer Science, 2019, 46(11): 100-108. |
[11] | JU An-kang, GUO Yuan-bo and ZHU Tai-ming. Framework for Big Data Network Security Situational Awareness and Threat Warning Based on Open Source Toolset [J]. Computer Science, 2017, 44(5): 125-131. |
[12] | ZHENG Wei, HUANG Yue-ming, WU Xiao-xue, FENG Chen and LIN Jun. Research on Recommendation of Concurrency Bug Testing Tools Based on Ontology [J]. Computer Science, 2017, 44(11): 202-206. |
[13] | LIU Ya-jun, LI Bing, LI Zeng-yang, LIANG Peng and WU Min-quan. Study on Technical Debt Management of Integrated Development Environment [J]. Computer Science, 2017, 44(11): 15-21. |
[14] | XU Wen-hua and ZHANG Yu-ping. Design and Implementation of Safety Analysis Tool Based on Avionics System Architecture Model [J]. Computer Science, 2016, 43(Z11): 536-541. |
[15] | HU Jun, SHI Jiao-jie, CHENG Zhen, CHEN Song and WANG Ming-ming. System Safety Modeling and Analysis Method Based on Four-variable Model [J]. Computer Science, 2016, 43(11): 193-199. |
|