IEEE Standard for System and Software Verification and Validation IEEE Std 1012-2012 Front Cover -14 Title Page -12 Notice to users -9 Laws and regulations -9 Copyrights -9 Updating of IEEE documents -9 Errata -9 Patents -8 Participants -7 Introduction -5 Contents -3 Important notice 1 1. Overview 1 1.1 Scope 1 1.2 Purpose 2 1.3 Field of application 3 1.4 V&V objectives 4 1.5 Organization of the standard 4 1.6 Audience 6 1.7 Conformance 7 1.8 Disclaimer 7 2. Normative references 7 3. Definitions, abbreviations, and acronyms 7 3.1 Definitions 7 3.2 Abbreviations and acronyms 11 4. Relationships between V&V and life cycle processes 12 5. Integrity levels 15 6. V&V processes overview 17 6.1 General 17 6.2 V&V testing 18 7. Common V&V activities 19 7.1 Activity: V&V Management 19 7.2 Activity: Acquisition Support V&V 20 7.3 Activity: Supply Planning V&V 21 7.4 Activity: Project Planning V&V 21 7.5 Activity: Configuration Management V&V 21 8. System V&V activities 33 8.1 Activity: Stakeholder Requirements Definition V&V 33 The purpose of the Stakeholder Requirements Definition Process is to define the requirements for a system that can provide the services needed by users and other stakeholders in a defined environment. It identifies stakeholders, or stakeholder classes... 33 The V&V effort shall perform, as specified in Table 2b for the selected integrity level, the following Stakeholder Requirements Definition V&V tasks described in Table 1b: 33 8.2 Activity: Requirements Analysis V&V 33 8.3 Activity: Architectural Design V&V 34 8.4 Activity: Implementation V&V 35 8.5 Activity: Integration V&V 35 8.6 Activity: Transition V&V 36 8.7 Activity: Operation V&V 36 8.8 Activity: Maintenance V&V 37 8.9 Activity: Disposal V&V 38 9. Software V&V activities 68 9.1 Activity: Software Concept V&V 68 9.2 Activity: Software Requirements V&V 68 9.3 Activity: Software Design V&V 69 9.4 Activity: Software Construction V&V 69 9.5 Activity: Software Integration Test V&V 70 9.6 Activity: Software Qualification Test V&V 70 9.7 Activity: Software Acceptance Test V&V 71 9.8 Activity: Software Installation and Checkout V&V 71 9.9 Activity: Software Operation V&V 72 9.10 Activity: Software Maintenance V&V 72 9.11 Activity: Software Disposal V&V 73 10. Hardware V&V activities 110 10.1 Activity: Hardware Concept V&V 110 10.2 Activity: Hardware Requirements V&V 110 10.3 Activity: Hardware Design V&V 111 10.4 Activity: Hardware Fabrication V&V 111 10.5 Activity: Hardware Integration Test V&V 112 10.6 Activity: Hardware Qualification Test V&V 112 10.7 Activity: Hardware Acceptance Test V&V 113 10.8 Activity: Hardware Transition V&V 113 10.9 Activity: Hardware Operation V&V 114 10.10 Activity: Hardware Maintenance V&V 114 10.11 Activity: Hardware Disposal V&V 115 11. V&V reporting, administrative, and documentation requirements 147 11.1 V&V reporting requirements 147 11.2 V&V administrative requirements 150 11.3 V&V documentation requirements 150 12. V&V plan outline 151 12.1 Overview 151 12.2 VVP Section 1: Purpose 152 12.3 VVP Section 2: Referenced documents 152 12.4 VVP Section 3: Definitions 152 12.5 VVP Section 4: V&V overview 152 12.5.1 VVP Section 4.1: Organization 152 12.5.2 VVP Section 4.2: Master schedule 153 12.5.3 VVP Section 4.3: Integrity level scheme 153 12.5.4 VVP Section 4.4: Resources summary 153 12.5.5 VVP Section 4.5: Responsibilities 153 12.5.6 VVP Section 4.6: Tools, techniques, and methods 153 12.6 VVP Section 5: V&V processes 154 12.6.1 VVP Section 5.1: Common V&V Processes, Activities, and Tasks 154 12.6.2 VVP Section 5.2: System V&V Processes, Activities, and Tasks 154 12.6.3 VVP Section 5.3: Software V&V Processes, Activities, and Tasks 154 12.6.4 VVP Section 5.4: Hardware V&V Processes, Activities, and Tasks 154 12.7 VVP Section 6: V&V reporting requirements 154 12.8 VVP Section 7: V&V administrative requirements 154 12.8.1 General 154 12.8.2 VVP Section 7.1: Anomaly resolution and reporting 154 12.8.3 VVP Section 7.2: Task iteration policy 154 12.8.4 VVP Section 7.3: Deviation policy 155 12.8.5 VVP Section 7.4: Control procedures 155 12.8.6 VVP Section 7.5: Standards, practices, and conventions 155 12.9 VVP Section 8: V&V test documentation requirements 155 Annex A (informative) Mapping of IEEE 1012 V&V activities and tasks 156 A.1 Mapping of ISO/IEC 15288 V&V requirements to IEEE 1012 V&V activities and tasks 156 A.2 Mapping of IEEE 1012 V&V activities to ISO/IEC 15288 system life cycle processes and activities 158 A.3 Mapping of ISO/IEC 12207 V&V requirements to IEEE 1012 V&V activities and tasks 159 A.4 Mapping of IEEE 1012 V&V activities to IEEE 12207 software life cycle processes and activities 161 Annex B (informative) A risk-based, integrity-level scheme 163 Annex C (informative) Definition of independent V&V (IV&V) 165 C.1 Technical independence 165 C.2 Managerial independence 165 C.3 Financial independence 165 C.4 Forms of independence 165 C.4.1 Classical IV&V 166 C.4.2 Modified IV&V 166 C.4.3 Integrated IV&V 166 C.4.4 Internal IV&V 166 C.4.5 Embedded V&V 167 Annex D (informative) V&V of reuse software 168 D.1 Purpose 168 D.2 V&V of software developed in a reuse process 169 D.2.1 V&V of assets in development 169 D.2.2 V&V of reused assets 169 D.3 V&V of software developed and reused outside of a reuse process 169 Annex E (informative) V&V measures 175 E.1 Introduction 175 E.2 Measures for evaluating anomaly density 175 E.3 Measures for evaluating V&V effectiveness 176 E.4 Measures for evaluating V&V efficiency 176 Annex F (informative) Example of V&V relationships to other project responsibilities 178 Annex G (informative) Optional V&V tasks 179 Annex H (informative) Environmental factors considerations 185 H.1 Introduction 185 H.2 In the agreement processes 185 H.3 In the organizational project-enabling processes 185 H.4 In the project processes 186 H.5 In the technical processes 186 Annex I (informative) V&V of system, software, and hardware integration 188 I.1 Introduction 188 I.2 Examples of system failures caused by integration issues 188 I.2.1 Year 2000 System Integration Issue 189 I.2.2 System architecture integration issues 189 I.3 System, software, and hardware interaction issues 190 Annex J (informative) Hazard, security, and risk analyses 193 J.1 Hazard analysis 193 Annex K (informative) Example of assigning and changing the system integrity level of “supporting system functions” 198 Annex L (informative) Mapping of ISO/IEC/IEEE 15288 and IEEE 12207 process outcomes to V&V tasks 200 Annex M (informative) Bibliography 209
2022-03-07 09:00:27 8.51MB IEEE 1012 测试验证 VER
1
IEEE std 802.1D-1998英文版标准文档,主要讲述STP(生成树协议),IEEE std 802.1D-2004版本中STP内容已被RSTP代替,想了解STP内容的朋友必须看此文档
2022-03-05 23:15:53 1.83MB 802.1D STP 生成树协议
1
虽然 ieee std 829-2008 已经出来了,但是暂时还下载不了,这个 ieee std 829-1998 是目前能下载的最全面的文档。
2022-03-01 16:14:31 586KB ieee std 829-1998
1
JTAG标准JTAG Specification
2022-02-28 09:59:59 18.92MB JTAG
1
应毕业论文要求,本人根据GB/T7714-2015自制了endnote引用模板,可以直接使用。 导入过程可以参考:http://download.csdn.net/detail/zwj554812115/8980193
2022-02-22 16:52:35 3KB endnote GBT7714 毕业论文
1
完整英文电子版 IEEE Std 802.1ACct ‐2021 Media Access Control (MAC) Service Definition Amendment 1:Support for IEEE Std 802.15.3(媒体访问控制(MAC)服务定义修正1:支持IEEE Std 802.15.3)。
2022-02-17 19:01:50 533KB 802.1ACct IEEE MAC 802.15.3
完整英文电子版 IEEE Std 802.11ay - 2021 Enhanced Throughput for Operations in License-exempt Bands above 45 GHz(提高 45 GHz 以上免许可频段操作的吞吐量)。
2022-02-17 19:01:50 9.92MB 802.11ay ieee 45GHz 吞吐量
完整英文电子版 IEEE Std 802.11ba-2021 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3:Wake-Up Radio Operation (无线 LAN 媒体访问控制 (MAC) 和物理层 (PHY) 规范修订 3:唤醒无线电操作)。本标准 — 定义了能够将预关联服务发现信息传递给 IEEE 802.11 站 (STA) 的机制。 — 定义一种机制,使 IEEE 802.11 STA 能够以极低的功耗运行,并通过唤醒信号以低延迟对传入流量作出反应。
2022-02-17 19:01:49 1.55MB IEEE 802.11ba WLAN 唤醒
完整英文电子版 IEEE Std 802.15.9-2021 IEEE Standard for Transport of Key Management Protocol (KMP) Datagrams(IEEE 密钥管理协议 (KMP) 数据报传输标准)。本标准定义了安全密钥管理扩展,以解决会话密钥生成(128 位和 256 位密钥长度)、广播/多播密钥的创建和/或传输以及安全算法的灵活性。 该标准保持与 IEEE Std 802.15.9-2016 的向后兼容性。本标准描述了对传输 KMP 数据报以支持 IEEE Std 802.15.4中存在的安全功能的支持。支持 KMP 传输的重要内容是定义了通用多路复用 (MPX) 数据服务,该服务支持分段、重组和 对无法放入单个媒体访问控制 (MAC) 帧的有效负载进行协议调度。
2022-02-17 19:01:49 999KB 安全 算法 媒体 macos
扫描安全漏洞,可用于web和APP漏洞扫描。AppScan_Std_9.0.3.5_Eval_Win下载
2022-02-16 16:29:11 844.85MB 安全漏洞
1