A framework for the development and assurance of high integrity software
Read Online
Share

A framework for the development and assurance of high integrity software by Dolores R. Wallace

  • 683 Want to read
  • ·
  • 36 Currently reading

Published by U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, For sale by the Supt. of Docs., U.S. G.P.O. in [Gaithersburg, MD], Washington, D.C .
Written in English

Subjects:

  • Computer software -- Reliability,
  • Computer software -- Standards -- United States,
  • Computer software -- Validation,
  • Computer software -- Verification

Book details:

Edition Notes

StatementDolores R. Wallace, Laura M. Ippolito.
SeriesNIST special publication -- 500-223., Computer systems technology, NIST sepcial publication
ContributionsIppolito, Laura M., National Institute of Standards and Technology (U.S.)
The Physical Object
FormatMicroform
Paginationxiv, 67 p.
Number of Pages67
ID Numbers
Open LibraryOL17790810M
OCLC/WorldCa33199684

Download A framework for the development and assurance of high integrity software

PDF EPUB FB2 MOBI RTF

Get this from a library! A framework for the development and assurance of high integrity software. [Dolores R Wallace; Laura M Ippolito]. This banner text can have markup.. web; books; video; audio; software; images; Toggle navigation. A framework for the development and assurance of high integrity software Author: Dolores R Wallace ; Laura M Ippolito ; National Institute of Standards and Technology (U.S.). The NIST High Integrity Software System Assurance (HISSA) program is the NIST internal program that includes development of technical products in software engineering, work performed on contracts with other agencies, organization of the NIST High Integrity System Lecture series, organization of the annual COMPASS conference, and other tasks in Cited by: 1.

system development where high integrity is demanded. The more rigorous modeling approaches support simulation and code generation, but have limited support for automated test generation. To address this need, the Test Automation Framework (TAF) approach for model-based analysis and test automation was developed. Model-Based Design for High Integrity Software Development Agenda Development and V&V of the Model Building a Model from Requirements – Introduction to Simulink Traceability of a Model to Requirements – Using the Requirements Management Interface – The Requirements Report Conformance to Modeling Standards – Using the Model Advisor. • IT quality assurance personnel, who test and ensure the integrity of the IT systems and data • Information system auditors, who audit IT systems • IT consultants, who support clients in risk management. RELATED REFERENCES This guide is based on the general concepts presented in National Institute of Standards and. Model-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc. Tucson, AZ USA. 1 ® ® Model-Based Design for High Integrity Software Development Agenda Development and V&V of the Model Building a Model from Requirements Introduction to Simulink.

such architecture, we propose IntegrityMR, an integrity assurance framework for big data analytics and management applications. We explore the result integrity check techniques at two alternative software layers: the MapReduce task layer and . ls ownership at a high­enough level to enact change; and are tasks aligned to realize benefits? Implementation methodology Data Quality: has the data been successfully migrated such that it is accurate, robust and in a usable formal? lnterfaces: has management implemented appropriate processes to flow data from one system to the nextFile Size: KB. Integrity in software development Integrity in software development Neumann, Peter G. Inside Peter G. Neumann Integrity in Software Development I n the September Inside Risks, David Parnas made a compelling case for defining the core body of software knowledge, evaluating the curricula, and licensing software practitioners the same . a software product during its sourcing, development and distribution. The software integrity controls discussed in the papers a reused by majorsoftware vendorsto add ss the isk thatins e cu rp ocess s, ora motivated attack r, ould undermine the security of a software product as it moves through the links in the global supply chain. The controlsFile Size: 1MB.