A security system is represented by a logigram. A logigram consists of events linked by rules. The rules stand for triggering links between the events. The simulator provides a set of processes on security systems. Circuit search and useless rules search (subsuming rules) check the topology of the system. Two search through methods simulate the flow of triggering on events. The forward chaining stands for the simulation of the actual behavior of the system. The backward chaining looks for possible causes of the occurrence of an event. The simulator permits, thanks to those functionality, to exhaustively check the conception of a security system.
展开▼