Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - An approach to synthesise safe systems
AU - Jhumka, A.
AU - Freiling, F.
AU - Fetzer, C.
AU - Suri, Neeraj
PY - 2006
Y1 - 2006
N2 - Detectors are system components that identify whether the system is in a particular state. Detectors can be used to ensure arbitrary safety properties for systems, that is, they can be used to prevent the system from reaching a ‘bad’ state. Detectors have found application in the area of fault-tolerant systems but can also be used in the area of security. We present here a theory of detectors that identifies the class of perfect detectors and explains their importance for fault-tolerant systems. Based on the theory, we develop an algorithm that automatically transforms a fault-intolerant program into a fault-tolerant program that satisfies its safety property even in the presence of faults. We further show how to use some of the results for adding security properties to a given insecure program. We provide examples to show the applicability of our approach. © 2006 Inderscience Enterprises Ltd.
AB - Detectors are system components that identify whether the system is in a particular state. Detectors can be used to ensure arbitrary safety properties for systems, that is, they can be used to prevent the system from reaching a ‘bad’ state. Detectors have found application in the area of fault-tolerant systems but can also be used in the area of security. We present here a theory of detectors that identifies the class of perfect detectors and explains their importance for fault-tolerant systems. Based on the theory, we develop an algorithm that automatically transforms a fault-intolerant program into a fault-tolerant program that satisfies its safety property even in the presence of faults. We further show how to use some of the results for adding security properties to a given insecure program. We provide examples to show the applicability of our approach. © 2006 Inderscience Enterprises Ltd.
KW - formal methods
KW - program transformation
KW - reliability
KW - safe systems
KW - security
U2 - 10.1504/IJSN.2006.010824
DO - 10.1504/IJSN.2006.010824
M3 - Journal article
VL - 1
SP - 62
EP - 74
JO - International Journal of Security and Networks
JF - International Journal of Security and Networks
SN - 1747-8405
IS - 1-2
ER -