英文翻译.docx

上传人:b****2 文档编号:1754989 上传时间:2023-05-01 格式:DOCX 页数:36 大小:186.61KB
下载 相关 举报
英文翻译.docx_第1页
第1页 / 共36页
英文翻译.docx_第2页
第2页 / 共36页
英文翻译.docx_第3页
第3页 / 共36页
英文翻译.docx_第4页
第4页 / 共36页
英文翻译.docx_第5页
第5页 / 共36页
英文翻译.docx_第6页
第6页 / 共36页
英文翻译.docx_第7页
第7页 / 共36页
英文翻译.docx_第8页
第8页 / 共36页
英文翻译.docx_第9页
第9页 / 共36页
英文翻译.docx_第10页
第10页 / 共36页
英文翻译.docx_第11页
第11页 / 共36页
英文翻译.docx_第12页
第12页 / 共36页
英文翻译.docx_第13页
第13页 / 共36页
英文翻译.docx_第14页
第14页 / 共36页
英文翻译.docx_第15页
第15页 / 共36页
英文翻译.docx_第16页
第16页 / 共36页
英文翻译.docx_第17页
第17页 / 共36页
英文翻译.docx_第18页
第18页 / 共36页
英文翻译.docx_第19页
第19页 / 共36页
英文翻译.docx_第20页
第20页 / 共36页
亲,该文档总共36页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

英文翻译.docx

《英文翻译.docx》由会员分享,可在线阅读,更多相关《英文翻译.docx(36页珍藏版)》请在冰点文库上搜索。

英文翻译.docx

英文翻译

ModelCheckingforE-BusinessControlandAssurance

BonnieBrintonAnderson,JamesV.Hansen,PaulBenjaminLowry,

andScottL.Summers

Abstract

Modelcheckingisapromisingtechniquefortheverificationofcomplexsoftwaresystems.AstheuseoftheInternetforconductinge-businessextendsthereachofmanyorganizations,well-designedsoftwarebecomesthefoundationofreliableimplementationofe-businessprocesses.Thesedistributed,electronicmethodsofconductingtransactionsplacerelianceonthecontrolstructuresembeddedinthetransactionprocesses.Deficienciesincontrolstructuresofprocessesthatsupporte-businesscanleadtolossofphysicalassets,digitalassets,money,andconsumerconfidence.Yet,assessingthereliabilityofe-businessprocessesiscomplexand

time-consuming.Thispaperexplicateshowmodel-checkingtechnologycanaidinthedesignandassuranceofe-businessprocessesincomplexdigitalenvironments.Specifically,wedemonstratehowmodelcheckingcanbeusedtoverifye-businessrequirementsconcerningmoneyatomicity,goodsatomicity,validreceipt,andcommunication-linkfailure.Theserequirementsarefundamentaltomanye-businessapplications.

Modelcheckingcanbeusedtotestabroadrangeofsystemsrequirements—notonlyforsystemdesigners,butalsoforauditorsandsecurityspecialists.Systemsthatareexaminedbyauditorsneedtohaveadequatecontrolsbuiltinpriortoimplementationandwillneedadequateauditingafterimplementationtoensurethatnoneoftheprocesseshavebeencorrupted.Modelcheckersmayalsoprovidevalueinexaminingtheprocessesofhighlyintegratedapplicationsasfoundinenterpriseresourceplanningsystems.

IndexTerms:

Atomicity,datatyping,e-Business,modelchecking,processandcommunicationprotocols.

I.INTRODUCTION

Internet-basedbusinessoperationsofferconsiderablepotential,buttheyareaccompaniedbyabroadrangeofoftenunprecedentedrisks.Anactualorperceivedlackofsystemsecurityandreliabilitycansignificantlyconstrainthegrowthofthedigitaleconomy.WhileprogressisbeingmadeinreducingInternetcomputationalrisksthroughavarietyofsoftwarepatchesandcryptographicalgorithms,theseeffortsaddressonlyasmallportionofthelargerchallengeofestablishingthe

necessarysecurityandreliabilityofe-businesssystems.Toresolvethischallenge,systematicmanagementoftheassociatedoperationalrisksisessential[1].

AccordingtoWangetal.[2],managementofoperationalrisksrequirescarefulexaminationofthee-businessinfrastructure.DistributedInternetcomputingischanginge-marketstructuresande-businessmodelsinfundamentalways.Althoughtheflexibilityofdistributede-operationssupportsopenaccessibilityanddynamicinteractions,flexibilitycanintensifyproblemsarisingfrome-marketinformationasymmetryande-businessoperationaluncertainty.Theseproblemsmilitateagainstinnovativee-commercedevelopments.Althoughe-commerceofferstheopportunityforbusinessestogainefficiencyandeffectivenessthroughnetwork-basedad-hocpartnerships,manybusinessesdonottakeadvantageoftheseopportunitiesbecauseoftheheightenedrisksofoperationaluncertaintyandperceivedinformationasymmetryamongunfamiliarbusinesspartners.

ManuscriptreceivedNovember18,2003;revisedMay17,2004.ThispaperwasrecommendedbyAssociateEditorS.Lakshmivarahan.

TheauthorsarewiththeMarriottSchoolofManagementand

KevinandDebraRollinsCenterfore-Business,BrighamYoung

University,Provo,UT84602USA(e-mail:

Bonnie_Anderson@BYU.edu;

James_Hansen@BYU.edu,Paul_Lowry@BYU.edu;Scott_Summers@

BYU.edu).

DigitalObjectIdentifier10.1109/TSMCC.2004.843181

Theseissuestakeonaddedimportanceasnewbusinessmodelsandarchitectures—suchasInternetauctions,webservices[3]andthesemanticweb[4]—offerbroadsupportforlooselycoupled,e-commercetransactionswherebuyersandsellersmaynothaveanypriortradingexperiencewithoneanother.Forexample,thewebservices[3]platformprovidestheUniversalDescription,DiscoveryandIntegration(UDDI)registryfordiscoveryofe-commerceservices,WSDLforservicedescription,andSOAPfortransactionexecution.Thesefacilitiesrequirenopriorknowledgeofbuyerandsellerbyeitherparty.Insuchenvironments,merchantsandcustomersmaybereluctanttotrustoneanotherandthefollowingsituationsmayarise:

Acustomerisunwillingtopayforaproductwithoutbeingcertainthecorrectproductwillbesent.Amerchantisunwillingtosendaproductwithoutcertaintyofreceivingpayment.Ifamerchantdeliverstheproductwithoutreceivingpayment,afraudulentcustomermayreceivetheproductandthendisappear,witharesultinglosstothemerchant.Ifacustomerpaysbeforereceivingtheproduct,amerchantmaynotdeliverormaydeliverawrongproduct.Thesepossibilitiesunderscoretheneedforcarefullydesignede-commercemodelsthatarerobustunderallevents.

AsWangetal.[5]note,e-systemcomplexityandhumanlimitationsmakeitimpossibletoimagineallscenariosandguaranteecorrectprocessingunderallcircumstances—evenforcarefullydesignedandimplementedcode.Muchofthisdifficultyisduetointerconnectivity,whichwidensthepotentialrangeoferrororvulnerability.Variationinexecutionofconcurrentprocessesinnonstop,nondeterministicsystemsincreasesthepotentialforautomationfailures.Consequentlyminimizingflawsintransactionprotocolsiscrucialforthesurvivalandsustainabilityofe-business.Stakeholders,suchassystemdesigners,users,andauditorsneedmethodstoprecludethesesubtlebutpotentiallycriticalmistakes—beforeerroneousprocessingoccursoranattackerexploitsthem—toenhancecontrolandassurancetoe-commerceusers.Modelcheckingoffersapromisingmethodforaddressingtheseissues.

II.MODELCHECKINGFUNDAMENTALS

Automationfailuresoccurwhenanautomatedsystembehavesdifferentlythanitsstakeholdersexpect.Iftheactualsystembehaviorandthestakeholdersmodelarebothdescribedasfinitestatetransitionsystems,thenmechanizedtechniquesknownasmodelcheckingcanbeusedtoautomaticallydiscoveranyscenariosthatcausethebehaviorsofthetwodescriptionstodivergefromoneanother.Thesescenariosidentifypotentialfailuresandpinpointareaswheredesignchangesorrevisionsshouldbeconsidered

Modelcheckingcantracethroughallrelevantstateswithrespecttoanygivenrequirement.Sincemodelcheckingoperatesonlogicratherthanindividualexecutionpaths,verificationcanbemorethoroughandefficientthantestrunsandsimulation.Someofthemostcompellingfeaturesofmodelcheckersaresummarizedasfollows[6].

1)Theyhelpdelimitasystem’sboundaryortheinterfacebetweenthesystemanditsenvironment.

2)Theypreciselydefineasystem’sdesiredproperties.

3)Theycharacterizeasystem’sbehaviormoreaccurately.Mostcurrentmethodsfocusonfunctionalbehavioronly(e.g.,“Whatisthecorrectanswer?

”)butsomecanhandlereal-timebehavioraswell(e.g.,“Isthecorrectanswerdeliveredontime?

”).

4)Theycanaidinprovingthatasystemmeetsrequiredspecifications.Byprovidingcounterexamplesthatshowhowspecificationsarenotsatisfied,modelcheckerscanpinpointthecircumstancesunderwhichasystemdoesnotmeetitsspecifications.

Thiscanalsohelptocorrectthesystem.

Thesefeaturesofmodelcheckersaidstakeholdersintwoimportantways.

1)Throughspecification,byfocusingasystemdesigner’sattentiontocrucialquestions,suchas:

Whatistheinterface?

Whataretheassumptionsabouttheapplication’senvironment?

Whatisthesystemsupposedtodounderthisconditionorthatcondition?

Whathappensifthatconditionisnotmet?

Whatarethesystem’sinvariantproperties?

2)Throughverification,byprovidingadditionalassurance.Relyingonproofthatasystemmeetsitssecuritygoalsisbetterthanrelyingonopinion—evenexpertopinion.

Itshouldbeemphasizedthatanyproofofcorrectnessisrelativetoboththeformalspecificationofasystemandtheformalspecificationofthedesiredproperties:

asystemprovencorrectwithrespecttoanincorrectspecificationleavesnoassuranceaboutthesystematall.

Theprocessofprovingentailsthreeactions:

First,thesystemofinterestmustbemodeled.Amathematicalmodelisconstructedthatexpressesthesemanticstructureofane-businessimplementation.

Second,allpropertiestobeguaranteedintheimplementationareformallyspecified.Inane-businesscontext,onesuchspecificationmightbethatgoodsmustalwaysbereceivedbeforepaymentisinitiated.

Third,aproofisprovided.Typically,aproofreliesoninductionovertracesofthee-commercecommunicationandtransactionoperations.

Ingeneral,verifyingthatanye-businessprocessisresilienttohiddenflawsanderrorsisadauntingtask.Manualmethodsareslowanderrorprone.Eventheoremprovers,whichprovideaformalstructureforverifyingstandardcharacteristics,mayrequirehumaninterventionandcanbetime-consuming.Moreover,evenifafailureisfoundusingatheoremprover,itmayprovidelittlehelpinlocatingthesourceofthe

failure[2].Simulationsoffercomputationalpower,buttheyareadhocinnatureandthereisnoguaranteetheywillexploreallimportantcontingencies[2].

Incontrast,modelcheckingisanevolvingtechnologythatcanprovideeffectiveandefficientevaluationofe-businessprocesses.Modelcheckingwasoriginallydevelopedforvalidatinghighlycomplexintegratedcircuitsandsoftwarepackages[7],[8],butithasrecentlybeenadoptedtotacklethecomplexityofe-commercetransactions[9],

[2],[10].Currentmodel-checkingtechnologyisbasedonautomatedtechniquesthata

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 总结汇报 > 学习总结

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2