Evaluation of Software Dependability Based on Pi Calculus

Article Preview

Abstract:

Evaluation is an important and basic issue for software dependability. However, traditional researches mostly focused on the conceptions and properties of dependability, which resulted in lots of different views about software dependability. Based upon Pi Calculus, dependable action path of software and real action path are set up through series of actions, which is decomposed by running software behaviors. In addition, three kinds of relationships between behaviors are defined. Consequently, the dependability is calculated by comparing the real running software actions to the decomposed ones based on the defined relationships. Experimental result conducted by MWB shows that the proposed method in one behavior is reasonable. At last, a real experiment proves the proposed measure method is more valid than traditional one.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 439-440)

Pages:

832-837

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C.Y. Li, G.S. Li, P.J. He. A Formal Dynamic Architecture Description Language. Journal of Software, 2006, 17(6): 1349−1359.

Google Scholar

[2] J. Friginal, J.C. Ruiz, D.D. Andr´es, P. Gil. Attack Injection for Performance and Dependability Assessment of Ad hoc Networks. In: Proc. of the 12th European Workshop on Dependable Computing(EWDC'09), 2009: 1-8.

DOI: 10.1109/prdc.2009.43

Google Scholar

[3] B. Łukasz, M. Katarzyna, W. Marek. Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results. In: Proc. of the Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, 2008: 237-244.

DOI: 10.1109/depcos-relcomex.2008.18

Google Scholar

[4] M. Żyła, D. Caban. Dependability Analysis of SOA Systems. In: Proc. of the Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, 2008:301-306.

DOI: 10.1109/depcos-relcomex.2008.20

Google Scholar

[5] I. Lee, R.K. Iyer. Software Dependability in the Tandem GUARDIAN System. IEEE Transaction on Software Engineering, 1995, 21(5): 455-467.

DOI: 10.1109/32.387474

Google Scholar

[6] K.C. Gross, S. McMaster, A. Porter, A. Urmanov, L.G. Votta Towards. Dependability in Everyday Software Using Software Telemetry. In: Proc. of the Third IEEE International Workshop on Engineering of Autonomic & Autonomous Systems, 2006: 9-18.

DOI: 10.1109/ease.2006.21

Google Scholar

[7] S. Distefano, A. Puliafito. Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 4-17.

DOI: 10.1109/tdsc.2007.70242

Google Scholar

[8] A. Mukherjee, D.P. Siewiorek. Measuring Software Dependability by Robustness Benchmarking. IEEE Transactions on Software Engineering, 1997, 23(6): 366-378.

DOI: 10.1109/32.601075

Google Scholar

[9] L.G. Huang. A Value-Based Process for Achieving Software Dependability. In: Proc. of International Software Process Workshop, 2005: 108-121.

Google Scholar

[10] Y.W. Qu. Software Behavior. Beijing: Electronic Industry Press, (2004).

Google Scholar

[11] C.X. Shen. Develops Dependability Computing Technology and Industry of Our Country. Hebei: China Trust Computing and Information Security, Keynote, 2006. 10. 21.

Google Scholar

[12] M. Bundgaard. A Brief Introduction to Mobility Workbench (MWB). http: /210. 40. 7. 188/ E'yan/01/000 MWB-Win32/01introMWB. pdf, (2005).

Google Scholar