A contractual approach for the verification of UML2.0 software architectures

被引:3
|
作者
Rouis, Taoufik Sakka [1 ]
Bhiri, Mohamed Tahar [2 ]
Kmimech, Mourad [3 ]
Moussa, Faouzi [1 ]
机构
[1] Univ Manouba, Cristal Lab, ENSI, Manouba, Tunisia
[2] Univ Manouba, MIRACL Lab, ISIMS, Manouba, Tunisia
[3] Univ Tunis El Manar, UR OASIS Lab, ENIT, Tunis, Tunisia
关键词
software architecture; verification; contract; UML2.0; PoSM; model-checker; FDR2;
D O I
10.1504/IJCAT.2018.090030
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The functional and qualitative properties are conventionally considered after software is completed. Currently, researchers consider treating those properties as soon as the architectural design phase. In this paper, the modelling and verification of the syntactic, behavioural and qualitative properties in UML2.0 software architectures are studied. To achieve this, a UML profile extending the UML2.0 component model by a set of qualitative concepts is proposed. The new profile, called CUMLQoS, is able to model the UML2.0 software architectures equipped with qualitative properties. Our verification approach suggests using the Acme/Armani ADL as a checking machine of syntactic and qualitative properties of UML2.0 software architectures deriving from our CUMLQoS profile. The choice of this ADL is justified by its ability of formal verification of different types of properties related to software architectures. As a second step of our verification approach, UML2.0, Port State Machine (PoSM), Wright and CSP are combined to check the behavioural consistency of UML2.0 software architecture. To achieve this, a set of systematic rules is proposed allowing the translation of UML2.0 source model to the Wright target model. Using Wr2fdr tool, the Wright specification can automatically be translated to a CSP specification acceptable by the FDR2 model-checker.
引用
收藏
页码:45 / 58
页数:14
相关论文
共 42 条
  • [21] Towards a Formal Verification Approach for Cloud Software Architecture
    Ayach, Amal
    Sliman, Layth
    Kmimech, Mourad
    Bhiri, Mohamed Tahar
    Raddaoui, Badran
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 490 - 502
  • [22] A Specification and Detection Approach for Parallel Evolution Conflicts of Software Architectures
    Xu, Hongzhen
    Song, Wenlin
    Liu, Zhiqiang
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (03) : 373 - 398
  • [23] A Modeling and Verification Approach to the Design of Distributed IMA Architectures using TTEthernet
    Robati, Tiyam
    Gherbi, Abdelouahed
    Mullins, John
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 229 - 236
  • [24] Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory
    Sedaghatbaf, Ali
    Azgomi, Mohammad Abdollahi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 141 - 153
  • [25] Modeling and analysis of performance aspects for software architecture: A UML-based approach
    Dai, Lirong
    Cooper, Kendra
    Wong, W. Eric
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2006, 16 (03) : 347 - 378
  • [26] Taming the frame problem: an automated approach for robust UML class diagram specification and verification
    Viesca, Antonio Rosales
    Al Lail, Mustafa
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2024, : 619 - 641
  • [27] MBTA: A Model-Based Threat Analysis Approach for Software Architectures
    Motii, Anas
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023, 2023, 14181 : 121 - 134
  • [28] An Aspect-Oriented Approach for Supporting Autonomic Reconfiguration of Software Architectures
    Costa-Soria, Cristobal
    Perez, Jennifer
    Angel Carsi, Jose
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2011, 35 (01): : 14 - 26
  • [29] BGG: A Graph Grammar Approach for Software Architecture Verification and Reconfiguration
    Li, Chen
    Huang, Linpeng
    Chen, Luxi
    Yu, Chengyuan
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 291 - 298
  • [30] SafeRobots: A Model-Driven Approach for Designing Robotic Software Architectures
    Ramaswamy, Arunkumar
    Monsuez, Bruno
    Tapus, Adriana
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 131 - 134