The Community for Technology Leaders
Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05) (1999)
Washington, D.C.
Nov. 17, 1999 to Nov. 19, 1999
ISSN: 1530-2059
ISBN: 0-7695-0418-3
TABLE OF CONTENTS
Keynote I
Keynote II
Paper Session I: Evaluation and Testing

DynaMICs: An Automated and Independent Software-Fault Detection Approach (Abstract)

Ann Q. Gates , University of Texas at El Paso
Patricia J. Teller , University of Texas at El Paso
pp. 11

Assurance-Based Y2K Testing (Abstract)

Raymond Paul , OASD, Y2K Office
W. T. Tsai , University of Minnesota
Weiguang Shao , University of Minnesota
Jinbao Li , University of Minnesota
Sanjai Rayadurgam , University of Minnesota
pp. 27
Paper Session II: Special Session on UML for High Assurance Systems

Quantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart Models (Abstract)

M. Dal Cin , IMMD 3 University of Erlangen-Nuremberg and Technical University of Budapest
K. Kosmidis , IMMD 3 University of Erlangen-Nuremberg and Technical University of Budapest
G. Huszerl , IMMD 3 University of Erlangen-Nuremberg and Technical University of Budapest
pp. 37

Model Checking UML Statechart Diagrams Using JACK (Abstract)

Mieke Massink , Consiglio Nazionale delle Ricerche
Diego Latella , Consiglio Nazionale delle Ricerche
Stefania Gnesi , Consiglio Nazionale delle Ricerche
pp. 46

UML-Based Analysis of Embedded Systems Using a Mapping to VHDL (Abstract)

Betty H.C. Cheng , Michigan State University
William E. McUmber , Michigan State University
pp. 56
Paper Session III: Experience Reports

Applying Formal Methods to an Information Security Device: An Experience Report (Abstract)

Constance Heitmeyer , Naval Research Laboratory
Myla Archer , Naval Research Laboratory
James Kirby, Jr. , Naval Research Laboratory
pp. 81

Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2) (Abstract)

Satya Dodda , Sun Microsystems, Inc.
Li Gong , Sun Microsystems, Inc.
pp. 89
Paper Session IV: Fault Analysis

COTS-Based Fault Tolerance in Deep Space: Qualitative and Quantitative Analyses of a Bus Network Architecture (Abstract)

Savio N. Chau , California Institute of Technology
Ann T. Tai , IA Tech, Inc.
Leon Alkalai , California Institute of Technology
pp. 97
Panel Session I: Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?

Experience of Using COTS Components for Deep Space Missions (Abstract)

Savio Chau , California Institute of Technology
pp. 116

HASE in Wireless Systems (Abstract)

Isaac Levendel , Motorola Incorporated
pp. 117

COTS and High Assurance: An Oxymoron? (Abstract)

Jeffrey M. Voas , Reliable Software Technologies
pp. 119
Paper Session V: Case Studies

Lessons from 342 Medical Device Failures (Abstract)

Dolores R. Wallace , National Institute of Standards and Technology
D. Richard Kuhn , National Institute of Standards and Technology
pp. 123

Identifying Domain Axioms Using Binary Decision Diagrams (Abstract)

Mats P.E. Heimdahl , University of Minnesota
Barbara J. Czerny , Delphi Delco Electronics Systems
pp. 132

Analyzing the Real-Time Properties of a U.S. Navy Signal Processing System (Abstract)

Steve Goddard , University of Nebraska
Kevin Jeffay , University of North Carolina at Chapel Hill
pp. 141
Paper Session VI: Reliable Communications

Real-Time Atomic Transaction Processing Using Multi-Invariant Data Structure (Abstract)

Biao Chen , University of Texas at Dallas
Ing-Ray Chen , Virginia Polytechnic Institute
I-Ling Yen , University of Texas at Dallas
pp. 161

Autonomous Data Synchronization in Heterogeneous Systems to Assure the Transaction (Abstract)

Isao Kaji , Miyagi University
Yongdong Tan , Tokyo Institute of Technology
Kinji Mori , Tokyo Institute of Technology
pp. 169
Paper Session VII: Frameworks, Systems, Tools

Building Dependable Distributed Applications Using AQUA (Abstract)

David E. Bakken , BBN Technologies
Michel Cukier , University of Illinois at Urbana-Champaign
William H. Sanders , University of Illinois at Urbana-Champaign
Jennifer Ren , University of Illinois at Urbana-Champaign
David A. Karr , BBN Technologies
Paul Rubel , University of Illinois at Urbana-Champaign
pp. 189

A Framework for a Cryptographic Protocol Evaluation Workbench (Abstract)

William A. Wulf , Florida State University
Alec Yasinsac , National Academy of Engineering
pp. 197

The Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance Computing (Abstract)

Sandeep Tamboli , Carnegie Mellon University
Carol L. Hoover , Carnegie Mellon University
Jeffery Hansen , Carnegie Mellon University
Philip Koopman , Carnegie Mellon University
pp. 207

On the Requirements of High-Integrity Code Generation (Abstract)

Michael W. Whalen , University of Minnesota
Mats. P.E. Heimdahl , University of Minnesota
pp. 217
Panel Session II: What are the Most Critical Challenges to Integrating High Assurance Systems?
Paper Session VIII: Metrics and Modeling

Fault Detectability Analysis for Requirements Validation of Fault Tolerant Systems (Abstract)

Diego Del Gobbo , West Virginia University
Marcello R. Napolitano , West Virginia University
S. Easterbrook , University of Toronto
Bojan Cukic , West Virginia University
pp. 231

A Specification-Based Coverage Metric to Evaluate Test Sets (Abstract)

Paul E. Black , National Institute of Standards and Technology
Paul E. Ammann , George Mason University
pp. 239

How Much Testing is Enough? Applying Stopping Rules to Behavioral Model Testing (Abstract)

Charles Anderson , Colorado State University
Amjad Hajjar , Colorado State University
Mehmet Sahinoglu , Case Western Reserve
Tom Chen , Colorado State University
Anneliese von Mayrhauser , Colorado State University
pp. 249
Panel Session III: Should High Assurance Systems Use Software? Risk vs. Functionality

Software Systems: Consequence versus Functionality (Abstract)

Victor L. Winter , Sandia National Laboratories
Ray Berg , Sandia National Laboratories
pp. 269

An "in the limit" View (Abstract)

Larry J. Dalton , Sandia National Laborities
pp. 272

A World Without Risks: Let Me Out! (Abstract)

Jeffrey M. Voas , Reliable Software Technologies
pp. 274

Author Index (PDF)

pp. 275
92 ms
(Ver 3.3 (11022016))