Other modelling formalisms Sample Clauses

Other modelling formalisms. Aside from the UML-based family of modelling formalisms, other SESAMO modelling formalisms are associated with specific toolsets. For example, The BDMP (Boolean logic Driven Markov Processes) formalism was adapted from the dependability area to the security domain in order to model attack scenarios, and is supported by the KB3 modelling software platform of consortium partner EDF to let security analysts build and analyze security-oriented BDMP models. Similarly, the ASCE tool of SESAMO partner Xxxxxxx uses its own formalism for modelling security informed safety cases. The SCYTHER tool uses a specialized modelling language, the Security Protocol Description Language, which can characterize security protocols and verify security claims. The IMACT tool of partner XxxXX is another example of the use of a specialized modelling formalism to implement a model-based engineering approach in the avionics domain of SESAMO. Figure 16 – Model-based approach in the avionics domain (see also Appendix A) As illustrated in Figure 16, the IMACT tool implements a classic model-based engineering approach with a specialized modelling language capable of representing the elements of the Integrated Modular Architecture (IMA) – including the SESAMO partitioning building blocks. While creating the model, the user resolves ambiguities and makes trade-offs as appropriate on the basis of analyses run on the models (this is where the SESAMO analytic techniques are applicable). Code generation can follow, much as in the AUTOSAR approach in the automotive domain. For further information on the IMACT workflow and technical details see Appendix A. All of these specialized modelling formalisms co-exist within the SESAMO modelling environment, and are likely to be in use simultaneously within modelling initiatives, supported by different parts of the SESAMO toolchain. The degree of interoperability between those different tools will be determined by the possibility of property and semantics preserving M2M transformations between the formalisms used by the tools. This has been possible for those in the UML family, despite the use of different profiles and despite their different commercial providers. It has also been possible when modelling tools come from the same overall family. For example, modelling tools that come from the SysML based AVATAR family and are in use within the consortium (see ProVerif [18] and UPPAAL [11] within the railway use case) have been successfully provided with ...
AutoNDA by SimpleDocs

Related to Other modelling formalisms

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • FABRICATION Making up data or results and recording or reporting them.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Design At no cost to SCE, Seller shall be responsible for:

  • Logging The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

  • Scaling “Scaling,” as used herein, involves:

  • Model List your model number of the product you are bidding.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

Time is Money Join Law Insider Premium to draft better contracts faster.