Verification and validation for trustworthy software systems

Loading...
Thumbnail Image
Authors
Michael, James Bret
Drusinsky, Doron
Otani, Thomas W.
Shing, Man-Tak
Subjects
Advisors
Date of Issue
2011
Date
Publisher
IEEE
Language
Abstract
The close interaction between high-integrity systems and their operating environments places a high priority on understanding and satisfying both functional requirements (what the software must do) and safety requirements (what the system must not do). However, traditional validation methods that test the delivered system’s behavior against customer expectations are ineffective (and too late) to assure requirement correctness. Validating requirements early in the system life cycle is increasingly important to organizations that implement capability-based acquisition. For instance, government organizations such as the US Department of Defense (DoD) now play the role of smart buyers whose job is to acquire a set of capabilities. This makes the task of assuring that the system developers correctly translate capabilities into system specifications even more vital. Without such assurance, the DoD can’t reasonably expect successful development of trustworthy software-intensive systems. The US Food and Drug Administration (FDA), on the other hand, plays the role of regulator with the responsibility of approving public use of, say, safety critical medical devices and investigating the cause of mishaps involving these devices. The FDA must ensure that the device behaves as the manufacturer specifies and that the manufacturer acts with due diligence in assessing its products’ trustworthiness - without source code or other detailed information about the systems’ implementation. These examples highlight the need for the continuous and proactive verification and validation (V&V) of complex and safety-critical software systems. This article presents a continuous, computer-aided process that uses statechart assertions, runtime execution monitoring, and scenario-based testing to specify and validate complex system requirements.
Type
Article
Description
The article of record as published may be found at http://dx.doi.org/10.1109/MS.2011.151
Series/Report No
Department
Electrical and Computer Engineering
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funder
Format
8 p.
Citation
J.B. Michael, D. Drusinsky, T.W. Otani, M.-T. Shing, " Verification and validation for trustworthy software systems," IEEE Software, v.28, no.6, (November-Decemeber 2011), pp. 86-92.
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections