期刊文献+

建立和分析安全关键系统的错误传递图 被引量:2

Establishment and Analysis of Error Transfer Diagram of Security Critical System
下载PDF
导出
摘要 一个大型的安全关键系统常常由成千上万的部件所组成,在这类系统中检测错误会耗费巨大的时间和代价。讨论如何根据系统的行为和功能,以及部件之间的关系来建立FPG;如何用形式方法描述FPG,以及使用多重错误检测(MFD2)算法来确定错误的源头,利用错误模式和后果分析方法有选择地在系统部件上放置警报器器。为系统来建立一个错误传递图来检测错误,能够极大的减少系统的重担。实验证明在识别错误的来源时使用多重错误检测算法能够识别出产生单一或多重错误的源节点。 A large security critical system is often composed of thousand of components and the diagnosis of faults in such a system is time-consuming and computationally costly. Discusses how to set up FPG according to the behavior and function of the system as well as the relationship between the components, and uses formal methods to describe it. And how to use multiple error detection algorithm to determine the error source, uses error modes and effect analysis method to place the alarm on components selectively. Modelling and analysing fault propagation by graph is helping to reduce such a burden. The experiment shows that using muhiple error detection algorithm in the error sources identification can identify the source node producing single or multiple errors.
作者 薛亮
出处 《现代计算机》 2011年第19期21-24,29,共5页 Modern Computer
关键词 安全关键系统 错误传递图 多重错误检测算法 警报器放置:错误模式和后果分析方法 Security Critical Systems Fault Propagation Graph Multiple Fault Diagnosis Alarm Placement Failure Modes and Effects Analysis
  • 相关文献

参考文献4

  • 1Yiannis Papadopoulos. Safety-Directed System Monitoring Using Safety Cases, Department of Computer Science, University of York, Feb 2000. 被引量:1
  • 2Frantz Iwu, Ian Toyn. Modelling and Analysing Fault Propa-gation in Safety-Related Systems. Department of Computer Science, University of York, 2007. 被引量:1
  • 3Jim Woodcock, Jim Davies, Using Z Specification, Refinement, and Proof, Prentice Hall, Europe, 1996. 被引量:1
  • 4Procedures for Performing Failure Mode Effects and Criticality Analysis. US MIL_STD_1629A Nov, 1980. 被引量:1

同被引文献6

  • 1佚名,定位Java类中的每个方法在类文件中的位置(终结篇),[EB/OL],(2007-08-15).[2016-02-03].ht-tp://xrnpl23.blogjava.net,. 被引量:1
  • 2J avassist, Java bytecode engineering tDolkit [ EB/OL]. ( 2016-01-05 ). E2016-02-03]. http: //www. csg. is. titech, ac.j p / ~ chiba/javassist. 被引量:1
  • 3HORTSMANN C S, CORNELL G. Core Java[-M].California, Pearson Education, 2008 ~ 217-225. 被引量:1
  • 4NIEMEYER P, KNUDSEN J Learning Java [M].Fourth Edition, O~ Reilly media,2014. 209-216. 被引量:1
  • 5Classes of the reflection API in Java tutorials[EB/OL]. (2015-06-15). [2016-2-3]. http.//does, oracle, com/javase/ tutorial/ refleet/ class/ classNew.html,. 被引量:1
  • 6薛亮.优化安全关键系统中的警报器放置[J].信息安全与技术,2012,3(9):100-105. 被引量:2

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部