36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of The 2003
DOI: 10.1109/hicss.2003.1174915
|View full text |Cite
|
Sign up to set email alerts
|

Verifying trustworthiness requirements in distributed systems with formal log-file analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2003
2003
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…These models and invariants may help developers in different tasks, such as comprehensibility and testing. These approaches generate different types of models, such as (finite) state machines ( Ulrich et al, 2003 ; Mariani & Pastore, 2008 ; Tan et al, 2010 ; Beschastnikh et al, 2014 ) directed workflow graphs ( Wu, Anchuri & Li, 2017 ) client-server interaction diagrams ( Awad & Menasce, 2016 ), invariants ( Kc & Gu, 2011 ; Lou et al, 2010 ), and dependency models ( Steinle et al, 2006 ).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…These models and invariants may help developers in different tasks, such as comprehensibility and testing. These approaches generate different types of models, such as (finite) state machines ( Ulrich et al, 2003 ; Mariani & Pastore, 2008 ; Tan et al, 2010 ; Beschastnikh et al, 2014 ) directed workflow graphs ( Wu, Anchuri & Li, 2017 ) client-server interaction diagrams ( Awad & Menasce, 2016 ), invariants ( Kc & Gu, 2011 ; Lou et al, 2010 ), and dependency models ( Steinle et al, 2006 ).…”
Section: Resultsmentioning
confidence: 99%
“…The authors show that their models are sufficiently accurate to help developers in finding bugs. Ulrich et al (2003) show how log traces can be used to build formal execution models. The authors use SDL, a model-checking description technique, common in telecommunication industries.…”
Section: Resultsmentioning
confidence: 99%
“…The class of properties is restricted to those allowing automata representation (e.g., LTL), while the use of a general model checker that is advocated in our paper allows us to consider more complex properties. Earlier findings are published in [14] and [30]. This paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Real-time extensions for TTCN as well as a formalised evaluation of log files in general are not new. For example, [UHPB03] presents an approach for a formalised analysis of log files: Log files of a distributed system are obtained by monitoring and later-on transformed into a formal SDL [ITU99a] representation which can be checked by a model checker. Unfortunately, this approach involves several activities which cannot be specified and automatically executed as part of a test case.…”
Section: Related Workmentioning
confidence: 99%
“…A similar pattern-based approach, which applies for passive testing, can be found in [HBUP03]. It is based on [UHPB03] which has been briefly discussed in Section 3.8. The approach is to obtain a trace of a distributed system under test by monitoring.…”
Section: Related Workmentioning
confidence: 99%