Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1101908.1102003acmconferencesArticle/Chapter ViewAbstractPublication PagesaseConference Proceedingsconference-collections
Article

Software certificate management (SoftCeMent'05)

Published: 07 November 2005 Publication History

Abstract

The goal of this workshop is to explore new technologies, underlying principles, and general methodologies for supporting software certificate management. Software certification demonstrates the reliability, safety, or security of software systems in such a way that it can be checked by an independent authority with minimal trust in the techniques and tools used in the certification process itself. It can build on existing validation and verification (V&V) techniques but introduces the notion of explicit software certificates, which contain all the information necessary for an independent assessment of the demonstrated properties. Software certificates support a product-oriented assurance approach, combining different techniques and forms of evidence (e.g., fault trees, "sign-offs", safety cases, formal proofs, ...) and linking them to the details of the underlying software. A software certificate management system provides the infrastructure to create, maintain, and analyze software certificates. It combines functionalities of a database (e.g., storing and retrieving certificates) and a make-tool (e.g., incremental re-certification). It can also maintain links between system artifacts (e.g., design documents, engineering data sets, or programs) and different varieties of certificates, check the validity of certificates, provide access to explicit audit trails, enable browsing of certification histories, and enforce system-wide certification and release policies. It can at any time provide current information about the certification status of each component in the system, check whether certificates have been audited, compute which certificates remain valid after a system modification, or even automatically start an incremental recertification.

Cited By

View all
  • (2016)Quality Assurance in Scrum Applied to Safety Critical SoftwareAgile Processes, in Software Engineering, and Extreme Programming10.1007/978-3-319-33515-5_8(92-103)Online publication date: 15-May-2016
  • (2012)Intention Semantics and Trust EvidenceISSE 2012 Securing Electronic Business Processes10.1007/978-3-658-00333-3_23(243-251)Online publication date: 11-Dec-2012
  • (2012)Using Open Source Projects in Higher EducationRevised Selected Papers of the SEFM 2012 Satellite Events on Information Technology and Open Source: Applications for Education, Innovation, and Sustainability - Volume 799110.1007/978-3-642-54338-8_22(274-280)Online publication date: 1-Oct-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASE '05: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering
November 2005
482 pages
ISBN:1581139934
DOI:10.1145/1101908
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2005

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

ASE05

Acceptance Rates

Overall Acceptance Rate 82 of 337 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Quality Assurance in Scrum Applied to Safety Critical SoftwareAgile Processes, in Software Engineering, and Extreme Programming10.1007/978-3-319-33515-5_8(92-103)Online publication date: 15-May-2016
  • (2012)Intention Semantics and Trust EvidenceISSE 2012 Securing Electronic Business Processes10.1007/978-3-658-00333-3_23(243-251)Online publication date: 11-Dec-2012
  • (2012)Using Open Source Projects in Higher EducationRevised Selected Papers of the SEFM 2012 Satellite Events on Information Technology and Open Source: Applications for Education, Innovation, and Sustainability - Volume 799110.1007/978-3-642-54338-8_22(274-280)Online publication date: 1-Oct-2012
  • (2010)Requirement traceability in safety critical systemsProceedings of the 1st Workshop on Critical Automotive applications: Robustness & Safety10.1145/1772643.1772647(11-14)Online publication date: 27-Apr-2010
  • (2009)Deriving Safety Cases for the Formal Safety Certification of Automatically Generated CodeElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2009.09.003238:4(19-26)Online publication date: 1-Sep-2009
  • (2009)Programming and Validation Techniques for Reliable Goal-driven Autonomic SoftwareAutonomic Communication10.1007/978-0-387-09753-4_9(231-247)Online publication date: 3-Aug-2009
  • (2008)Verification and semantic parallelization of goal-driven autonomous softwareProceedings of the 2nd International Conference on Autonomic Computing and Communication Systems10.5555/1487652.1487685(1-8)Online publication date: 23-Sep-2008

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media