We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMadisen Talbot
Modified about 1 year ago
Copyright © 2001 Praxis Critical Systems Limited New and Exciting Things in the World of SPARK Roderick Chapman Praxis Critical Systems
Copyright © 2001 Praxis Critical Systems Limited Contents Release 6 What does the “R” stand for? SPARK and Security
Copyright © 2001 Praxis Critical Systems Limited Release 6 - Language Modular types –Good for interfacing, crypto, checksums etc. –Binary modulus only. –No modular subtypes. Does anyone use them?!? –No unary arithmetic operators (-, +, abs). All rather useless. External variables –Variables which are known to be “connected” to the outside world. –Automatic treatment of volatility. –Allows far simpler modeling of I/O, clocks, delays and so on. “Null” derives annotation –Easier handling of testpoints, and other code “outside the SPARK boundary”
Copyright © 2001 Praxis Critical Systems Limited Release 6 - Plan Commercial customers - soon! Universities - after that… “High Integrity Ada: The SPARK Approach” 3rd edition, including new Examiner and Simplifier. –“Difficulties” with current publisher will be addressed!
Copyright © 2001 Praxis Critical Systems Limited SPARK - What does the “R” stand for? Don’t ask - but we might just change it to “Ravenscar” A Protected Object behaves like a volatile abstract state machine, but we know how to model those! External variables also mean we can include Ada.Real_Time and delay until.
Copyright © 2001 Praxis Critical Systems Limited Ravenscar (2) Library level tasks and their analysis is easy - they just look like parameterless procedures. Elimination of bounded errors (e.g. blocking in a PO body) is also possible via extended annotations and static analysis thereof. Will be implemented in release 7.
Copyright © 2001 Praxis Critical Systems Limited Something different SPARK and High-Security Systems SPARK is well-known in safety-critical arena. It also turns out that SPARK is well-suited to the needs to high-security software developments. The relevant standards (UK ITSEC, US Orange Book, Common Criteria) are at least as demanding as the comparable safety-critical standards. SPARK is the only language that meets the highest levels of Common Criteria requirements.
Copyright © 2001 Praxis Critical Systems Limited Messages to go home with SPARK has a proven technical and commercial track-record in meeting the most stringent software standards (00-55, DO-178B, CENELEC) SPARK is also well-suited to the development of highly secure software systems. –All the depressingly common “implementation slips” that plague secure systems are eliminated in SPARK- e.g. dataflow error, “buffer overflow” Watch out for the Common Criteria
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 10 Architectural Design.
Architectural Design IS301 – Software Engineering Lecture # 14 – M. E. Kabay, PhD, CISSP Dept of Computer Information Systems Norwich University.
A Roadmap: Beyond Big API’s Why Software Component Frameworks May Be Interactive Audio’s Future Chris Grigg
Testing Relational Database. Overview Once the design of a database system has been completed, the developers are ready to move into the implementation.
Understand and appreciate Object Oriented Programming (OOP) Objects are self-contained modules or subroutines that contain data as well as the functions.
1 Note content copyright © 2004 Ian Sommerville. NU-specific content copyright © 2004 M. E. Kabay. All rights reserved. Critical Systems Development IS301.
(2-Tier) (n-Tier) (Component) (Business Components)
1. 2 Configuring the Cloud Inside and out Paul Anderson publications/mysore-2010-talk.pdf School of.
An introduction to Ofqual Simon Perks – Policy Manager
A National Collection: A view from the British Library Anthony Troman Product Development Manager British Library.
Chapter 8 Technicalities: Functions, etc. Bjarne Stroustrup
Unit-V -SOFTWARE QUALITY. To develop and deliver robust system, we need a high level of confidence that Each component will behave correctly Collective.
1 OWG: Vulnerability ISO working group on Guidance for Avoiding Vulnerabilities through language selection and use John Benito, Convener Jim Moore, Secretary.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 5 Slide 1 Chapter 5 Software Requirements.
Chapter 2 Exploring the Human-Computer Interface.
Computers in the real world Objectives Understand the key ideas of the operating system Look at standard utility software and be able to describe them.
Safety Assessment The European Organisation for the Safety of Air Navigation.
Structured Design The Structured Design Approach (also called Layered Approach) focuses on the conceptual and physical level. As discussed earlier: Conceptual.
The Client/Server Database Environment CS263 Lecture 12.
For OWGV Meeting #1, 2006 June, Washington, DC, USA 1D Terms of Reference: ISO/IEC Project , Guidance to Avoiding Vulnerabilities in Programming.
Teaching Web Services and XML with the Water Language Christopher Fry Clear Methods, Inc. Ed Gehringer and Matt Kendall North Carolina State University.
+ I used to ___, but now I ___. ROGERS PUBLIC SCHOOLS October 2011.
3rd meeting COTS team April 25, 2007, Helsinki. AGENDA 9.00Opening of meeting 9.05Approval of agenda, minutes, Goal setting 9.15Feedback on the specific.
Ch:8 Design Concepts S.W Design should have following quality attribute: –Functionality –Usability –Reliability –Performance –Supportability (extensibility,
Math for Liberal Studies. An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept The number.
Data Analysis 1 Chapter 2.1 V3.1 Napier University Dr Gordon Russell.
Chapter:4 Principles That Guide Practice Unit II.
1 Object Systems Methods for attaching data to objects, and connecting behaviors Doug Church.
Object-Oriented Programming Session 9 Course : T Programming Language Concept Year : February 2011.
© 2016 SlidePlayer.com Inc. All rights reserved.