• Title/Summary/Keyword: Specification Validation

Search Result 100, Processing Time 0.025 seconds

Validation Tool of Elliptic Curves Cryptography Algorithm for the Mobile Internet (무선 환경에 적합한 타원곡선 암호 알고리즘의 검증도구)

  • Seo, Chang-Ho;Hong, Do-Won;Yun, Bo-Hyun;Kim, Seo-Kwoo;Lee, Ok-Yeon;Chung, Kyo-IL
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.569-576
    • /
    • 2004
  • Conventional researches of standard tool validating public key cryptographic algorithm have been studied for the internet environment, not for the mobile internet. It is important to develop the validation tool for establishment of interoperability and convenience of users in mobile internet. Therefore, this paper presents the validation tool of Elliptic Curie Cryptography algorithm that can test if following X9.62 technology standard specification. The validation tool can be applied all information securities using ECDSA, ECKCDSA, ECDH, etc. Moreover, we can en-hace the precision of validation through several experiments and perform the validation tool in the online environment.

Validation of ebXML BPSS Instances Based on Semantic Constraints (의미제약 기반의 ebXML BPSS 사례 검증)

  • Kim, Hyoung-Do;Kim, Jong-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.1-18
    • /
    • 2005
  • In ebXML, a representative framework for electronic commerce, a BPS (Business Process Specification) should be finally defined as an instance of XML-version BPSS for the configuration of B2B (Business to Business) runtime systems . In order to define the instance more complete and consistent, it is required to validate all the semantic constraints on the instance . Due to the limitations of XML Schema constructs, however, current XML-version BPSS fails to specify formal semantic constraints completely. This paper presents how to find, express and reuse BPSS semantic constraints that could not be explicitly defined in the XML-version BPSS. The method facilitates the validation of XML-version BPSS instances easily with some useful guides for fixing violations of semantic constraints. Furthermore, B2B business processes can be standardized and applied more efficiently and effectively.

  • PDF

NuSEE: AN INTEGRATED ENVIRONMENT OF SOFTWARE SPECIFICATION AND V&V FOR PLC BASED SAFETYCRITICAL SYSTEMS

  • Koo, Seo-Ryong;Seong, Poong-Hyun;Yoo, Jun-Beom;Cha, Sung-Deok;Youn, Cheong;Han, Hyun-Chul
    • Nuclear Engineering and Technology
    • /
    • v.38 no.3
    • /
    • pp.259-276
    • /
    • 2006
  • As the use of digital systems becomes more prevalent, adequate techniques for software specification and analysis have become increasingly important in nuclear power plant (NPP) safety-critical systems. Additionally, the importance of software verification and validation (V&V) based on adequate specification has received greater emphasis in view of improving software quality. For thorough V&V of safety-critical systems, V&V should be performed throughout the software lifecycle. However, systematic V&V is difficult as it involves many manual-oriented tasks. Tool support is needed in order to more conveniently perform software V&V. In response, we developed four kinds of computer aided software engineering (CASE) tools to support system specification for a formal-based analysis according to the software lifecycle. In this work, we achieved optimized integration of each tool. The toolset, NuSEE, is an integrated environment for software specification and V&V for PLC based safety-critical systems. In accordance with the software lifecycle, NuSEE consists of NuSISRT for the concept phase, NuSRS for the requirements phase, NuSDS for the design phase and NuSCM for configuration management. It is believed that after further development our integrated environment will be a unique and promising software specification and analysis toolset that will support the entire software lifecycle for the development of PLC based NPP safety-critical systems.

Script-based Test System for Rapid Verification of Atomic Models in Discrete Event System Specification Simulation

  • Nam, Su-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.101-107
    • /
    • 2022
  • Modeling and simulation is a technique used for operational verification, performance analysis, operational optimization, and prediction of target systems. Discrete Event System Specification (DEVS) of this representative technology defines models with a strict formalism and stratifies the structures between the models. When the atomic DEVS models operate with an intention different the target system, the simulation may lead to erroneous decision-making. However, most DEVS systems have the exclusion of the model test or provision of the manual test, so developers spend a lot of time verifying the atomic models. In this paper, we propose a script-based automated test system for accurate and fast validation of atomic models in Python-based DEVS. The proposed system uses both the existing method of manual testing and the new method of the script-based testing. As Experimental results in our system, the script-based test method was executed within 24 millisecond when the script was executed 10 times consecutively. Thus, the proposed system guarantees a fast verification time of the atomic models in our script-based test and improves the reusability of the test script.

Design of Validation System for a Crypto-Algorithm Implementation (암호 알고리즘 구현 적합성 평가 시스템 설계)

  • Ha, Kyeoung-Ju;Seo, Chang-Ho;Kim, Dae-Youb
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.242-250
    • /
    • 2014
  • Conventional researches of standard tool validating cryptographic algorithm have been studied for the internet environment, for the mobile internet. It is important to develop the validation tool for establishment of interoperability and convenience of users in the information systems. Therefore, this paper presents the validation tool of Elliptic Curve Cryptography algorithm that can test if following X9.62 technology standard specification. The validation tool can be applied all information securities using DES, SEED, AES, SHA-1/256/384/512, RSA-OAEP V2.0, V2.1, ECDSA, ECKCDSA, ECDH, etc. Moreover, we can enhance the precision of validation through several experiments and perform the validation tool in the online environment.

Validation Testing of Safety-critical Software (Safety-critical 소프트웨어의 검증시험)

  • Kim, Hang-Bae;Han, Jai-Bok
    • Nuclear Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.385-392
    • /
    • 1995
  • A software engineering process has been developed for the design of safety critical software for Wolsong 2/3/4 project to satisfy the requirement of the regulatory body. Among the process, this paper described the detail process of validation testing peformed to ensure that the software with its hardware, developed by the design group, satisfies the requirements of the functional specification prepared by the independent functional group. To perform the test, test facility and test software ore developed and actual safety system computer was connected. Three kinds of test cases, i.e., functional test performance test and self-check test were programmed and run to verify each functional specifications. Test failures ore fedback to the design group to revise the software and test result were analyzed and documented in the report to submit to the regulatory body. The test methodology and procedure were very efficient and satisfactory to perform the systematic and automatic test. The test results were also acceptable and successful to verify the software acts as specified in the program functional specification. This methodology can be applied to the validation of other safety-critical software.

  • PDF

Formal Validation Method and Tools for French Computerized Railway Interlocking Systems

  • Antoni, Marc
    • International Journal of Railway
    • /
    • v.2 no.3
    • /
    • pp.99-106
    • /
    • 2009
  • Checks and tests before putting safety facilities into service as well as the results of these tests are essential, time consuming and may show great variations between each other. Economic constraints and the increasing complexity associated with the development of computerized tools tend to limit the capacity of the classic approval process (manual or automatic). A reduction of the validation cover rate could result in practice. This is not compatible with the French national plan to renew the interlocking systems of the national network. The method and the tool presented in this paper makes it possible to formally validate new computerized systems or evolutions of existing French interlocking systems with real-time functional interpreted Petri nets. The aim of our project is to provide SNCF with a method for the formal validation of French interlocking systems. A formal proof method by assertion, which is applicable to industrial automation equipment such as interlocking systems, and which covers equally the specification and its real software implementation, is presented in this paper. With the proposed method we completely verify that the system follows all safety properties at all times and does not show superfluous conditions: it replaces all the indoor checks (not the outdoor checks). The advantages expected are a significant reduction of testing time and of the related costs, an increase of the test coverage rate, an answer to the new demand of railway infrastructure maintenance engineering to modify and validate computerized interlocking systems. Formal methods mastery by infrastructure engineers are surely a key to prove that more safety is not necessarily more expensive.

  • PDF

A Study on Improvement of Modular Specifications - Focused on technical specifying method in waterproof and mechanical works - (모듈러 공사시방서 개선방안에 관한 연구 - 방수 및 기계설비공사의 기술방안 개선을 중심으로 -)

  • Yoon, Jongsik;Shin, Dongwoo;Cha, Heesung;Kim, Kyungrai
    • Korean Journal of Construction Engineering and Management
    • /
    • v.18 no.3
    • /
    • pp.33-41
    • /
    • 2017
  • A modular specification is a contract document that specifies the requirements of production, transformation and installation in a modular construction. A problem of the currently used specification is that it does not guarantee the level of performance required by the modular construction and fails to accommodate unique characteristics of each construction because it widely uses the standard specification as it is. This study proposes a specification that reflects the unique feature of modular construction in order to improve the quality of modular construction. Research focuses on the leakage in waterproof and mechanical equipment because it is the area with the highest rate of defects. This study suggests ways to improve the modular specification as follows: 1)Descriptive specifying (following MasterFormat) 2)Propose leakage verification method and test clause 3) Reflect characteristic of modular construction. Proposed modifications to modular specification are reviewed by experts for validation and their opinion verifies suggested improvements as a way to secure the quality of modular construction and to promise characteristics of the modular specification. This improvement will be used for reference when writing construction project specification, which can be an important contract document, so that it could lower occurrence rate of the modular defects.

A study on interoperability and applicability of the Korean Radio based Train Control System(KRTCS) (무선기반 도시철도용 열차제어시스템(KRTCS)의 상호운영성 및 적용성 연구)

  • Kang, Yong-Sam
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.6
    • /
    • pp.1095-1102
    • /
    • 2016
  • A TCS(Train Control System) is the core facility to ensure the safety and efficiency of train operations, it is difficult to have interoperability between the TCS suppliers. To ensure the interoperability between TCSs, there is a need for definition, validation and standardization on the system configuration, the functions of subsystems, the interface between subsystems an the system protocol. In this paper, we analyzed the completeness of the KRTCS(Korean Radio based Train Control System) specification, derived supplements what you need to apply the KRTCS specification to new urban lines.

A Lightweight Authentication Mechanism for Acknowledgment in LR-WPAN Environment

  • Heo, Joon;Hong, Choong-Seon;Choi, Sang-Hyun
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.973-976
    • /
    • 2005
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method indicates that our mechanism is successful in handling MAC layer attack.

  • PDF