• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Yang, Wu Ji, Yuan Chunchun, Liu Chao, Yang Haiyan, Xing Liang. Objectives Conformity Argument Patterns for Software Testing Process in DO-178C[J]. Journal of Computer Research and Development, 2017, 54(3): 654-668. DOI: 10.7544/issn1000-1239.2017.20151055
Citation: Yang Yang, Wu Ji, Yuan Chunchun, Liu Chao, Yang Haiyan, Xing Liang. Objectives Conformity Argument Patterns for Software Testing Process in DO-178C[J]. Journal of Computer Research and Development, 2017, 54(3): 654-668. DOI: 10.7544/issn1000-1239.2017.20151055

Objectives Conformity Argument Patterns for Software Testing Process in DO-178C

More Information
  • Published Date: February 28, 2017
  • Safety-critical software has been widely used in many fields. As the specific requirement of safety-critical software is preventing catastrophes, this kind of software must comply with its relevant safety standards. But now it does not have any effective ways to construct objectives conformity argument model for standards. By analyzing the features of objectives of software testing process in DO-178C, an objective conformity argument pattern description framework based on GSN is proposed, and these patterns are described through four fields: the problems that we need to solve, the specification for the solution, the approach to use them and the effect after using them. At the same time, some extensions for safety case patterns are proposed to describe the objectives conformity argument patterns. On this basis, three objectives conformity argument patterns based on software testing process in DO-178C are proposed, which are code-requirement conformity argument pattern, test coverage of requirements argument pattern and test coverage of structure argument pattern. At the same time, the instantiated method to build the objectives conformity argument structure for a specific program based on these patterns is proposed. People can construct objectives conformity argument structure for objectives of software testing process in DO-178C effectively through the proposed way. At last, one case study, which is an embedded real-time operating system, indicates that the objectives conformity argument patterns proposed here are useful and effective.
  • Related Articles

    [1]Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
    [2]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [3]Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Wang Zhonghui. Updatable Attribute-Based Encryption Scheme Supporting Dynamic Change of User Rights[J]. Journal of Computer Research and Development, 2020, 57(5): 1057-1069. DOI: 10.7544/issn1000-1239.2020.20190254
    [4]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
    [5]Wu Qiyu, Zhou Fucai, Wang Qiang, Li Yuxi. Publicly Verifiable Databases Scheme with Efficient Updates and Low Storage Overhead[J]. Journal of Computer Research and Development, 2018, 55(8): 1800-1808. DOI: 10.7544/issn1000-1239.2018.20170320
    [6]Bao Yibao, Yin Lihua, Fang Binxing, Guo Li. Logic-Based Dynamical Security Policy Language and Verification[J]. Journal of Computer Research and Development, 2013, 50(5): 932-941.
    [7]Liu Xiaozhu, Peng Zhiyong. On-Line Dynamic Index Hybrid Update Scheme Based on Self-Learning of Allocated Space[J]. Journal of Computer Research and Development, 2012, 49(10): 2118-2130.
    [8]Xiang Sen, Chen Yiyun, Lin Chunxiao, and Li Long. Safety Verification of Dynamic Storage Management in Coq[J]. Journal of Computer Research and Development, 2007, 44(2): 361-367.
    [9]Zhao Xin, Li Xiaojian, and Wu Wei. A Centralized Warrant Distributing and Updating Approach for Secure Multicast Group Control[J]. Journal of Computer Research and Development, 2006, 43(8): 1391-1397.
    [10]Li Guohui, Wang Hongya, Liu Yunsheng. Updates Dissemination in Mobile Real-Time Database Systems[J]. Journal of Computer Research and Development, 2005, 42(11): 2004-2009.

Catalog

    Article views (1420) PDF downloads (428) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return