留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于场景控制特征的安全性需求分析方法

朱丹江 姚淑珍 谭火彬

朱丹江, 姚淑珍, 谭火彬等 . 基于场景控制特征的安全性需求分析方法[J]. 北京航空航天大学学报, 2016, 42(11): 2358-2370. doi: 10.13700/j.bh.1001-5965.2015.0757
引用本文: 朱丹江, 姚淑珍, 谭火彬等 . 基于场景控制特征的安全性需求分析方法[J]. 北京航空航天大学学报, 2016, 42(11): 2358-2370. doi: 10.13700/j.bh.1001-5965.2015.0757
ZHU Danjiang, YAO Shuzhen, TAN Huobinet al. Safety requirements analysis method based on control characteristics of scenarios[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(11): 2358-2370. doi: 10.13700/j.bh.1001-5965.2015.0757(in Chinese)
Citation: ZHU Danjiang, YAO Shuzhen, TAN Huobinet al. Safety requirements analysis method based on control characteristics of scenarios[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(11): 2358-2370. doi: 10.13700/j.bh.1001-5965.2015.0757(in Chinese)

基于场景控制特征的安全性需求分析方法

doi: 10.13700/j.bh.1001-5965.2015.0757
基金项目: 航空科学基金(2013ZC51023)
详细信息
    作者简介:

    朱丹江,男,博士研究生。主要研究方向:软件工程、软件测试。E-mail:danjiang@buaa.edu.cn;姚淑珍,女,博士,教授,博士生导师。主要研究方向:先进软件工程技术、形式化方法、Petri网理论。Tel.:010-82339434,E-mail:szyao@buaa.edu.cn;谭火彬,男,博士,讲师。主要研究方向:软件工程、软件建模。

    通讯作者:

    姚淑珍,Tel.:010-82339434,E-mail:szyao@buaa.edu.cn

  • 中图分类号: TP311

Safety requirements analysis method based on control characteristics of scenarios

  • 摘要: 安全性需求是系统安全性保证的关键。随着系统复杂度和耦合度的剧增,安全性需求的分析提取日益困难。通过对系统需求场景的控制结构和过程分析建模,提出描述控制过程中系统变量间关系的变量影响图模型,进一步给出了安全性需求分析方法。通过该方法,使用变量影响图等对控制过程进行分析,生成基于系统理论事故模型和过程(STAMP)的危险性控制活动,并以此获得系统安全性需求。经实验验证,所提出的安全性需求分析方法在正确性和一致性方面具有较好的效果。

     

  • [1] FLEMING C H,SPENCER M,THOMAS J,et al.Safety assurance in NextGen and complex transportation systems[J].Safety Science,2013,55:173-187.
    [2] LEVESON N G.Engineering a safer world:Systems thinking applied to safety[M].Boston,Massachusetts:MIT Press,2012:212-227.
    [3] BLACK J,KOOPMAN P.Indirect control path analysis and goal coverage strategies for elaborating system safety goals in composite systems[C]//Proceedings of the 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing.Piscataway,NJ:IEEE Press,2008:184-191.
    [4] SUPAKKUL S,CHUNG L.Applying a goal-oriented method for hazard analysis:A case study[C]//Proceedings of the 4th International Conference on Software Engineering Research,Management and Applications.Piscataway,NJ:IEEE Press,2006:22-30.
    [5] FIRESMITH D.Engineering safety-related requirements for software-intensive systems[C]//Proceedings of the 27th International Conference on Software Engineering.Piscataway,NJ:IEEE Press,2005:720-721.
    [6] FIRESMITH D.Engineering safety requirements,safety constraints,and safety-critical requirements[J].Journal of Object Technology,2004,3(3):27-42.
    [7] CHUNG L,SUPAKKUL S.Capturing and reusing functional and non-functional requirements knowledge:A goal-object pattern approach[C]//2006 IEEE International Conference on Information Reuse and Integration.Piscataway,NJ:IEEE Press,2006:539-544.
    [8] FIRESMITH D.A taxonomy of safety-related requirements[C]//2004 Proceedings of the Workshop on Requirements for High Assurance Systems (RHAS'04).Piscataway,NJ:IEEE Press,2004:11.
    [9] CHANG W,BAO X,LI X.A study on airborne software safety requirements patterns[C]//2013 IEEE 7th International Conference on Software Security and Reliability.Piscataway,NJ:IEEE Press,2013:131-136.
    [10] CHEN Z,MOTET G.System safety requirements as control structures[C]//2009 33rd Annual IEEE International Computer Software and Applications Conference.Piscataway,NJ:IEEE Press,2009:324-331.
    [11] YANG C.Software safety testing based on STPA[C]//3rd International Symposium on Aircraft Airworthiness (ISAA).Amsterdam:Elsevier,2014,80:399-406.
    [12] ALLENBY K,KELLY T.Deriving safety requirements using scenarios[C]//5th IEEE International Symposium on Requirements Engineering.Piscataway,NJ:IEEE Press,2001:228-235.
    [13] VYAS P,MITTAL R K.Eliciting additional safety requirements from use cases using SFTA[C]//2012 1st International Conference on Recent Advances in Information Technology.Piscataway,NJ:IEEE Press,2012:163-169.
    [14] GUILLERM R,DEMMOU H,SADOU N.A safety requirement engineering method and tool[C]//2013 21st IEEE International Conference on Requirements Engineering.Piscataway,NJ:IEEE Press,2013:328-329.
    [15] MENON C,KELLY T.Eliciting software safety requirements in complex systems[C]//2010 4th Annual IEEE Systems Conference.Piscataway,NJ:IEEE Press,2010:616-621.
    [16] THOMAS J P.Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis[D].Boston,Massachusetts:MIT,2013:71-87.
    [17] ASHBY W R.An introduction to cybernetics[M].London:Chapman & Hall,1957:202-216.
    [18] CHECKLAND P.Systems thinking,systems practice[M].New York:John Wiley & Sons,1981:271-284.
    [19] VANHATALO J,VÖLZER H,LEYMANN F.Faster and more focused control-flow analysis for business process models through SESE decomposition[C]//5th International Conference on Service-Oriented Computing(ICSOC 2007).Berlin:Springer,2007,4749:43-55.
    [20] FLEMING C H.Safety-driven early concept analysis and development[D].Boston,Massachusetts:MIT,2015:53-92.
    [21] INGHAM M D,RASMUSSEN R D,BENNETT M B,et al.Generating requirements for complex embedded systems using state analysis[J].Acta Astronautica,2006,58(12):648-661.
    [22] LEVESON N G.A systems-theoretic approach to safety in software-intensive systems[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):66-86.
    [23] ABDULKHALEQ A,WAGNER S.A-STPA:An open tool support for system-theoretic process analysis[C]//2014 STAMP Conference.Boston,Massachusetts:MIT Press,2014.
  • 加载中
计量
  • 文章访问数:  751
  • HTML全文浏览量:  91
  • PDF下载量:  437
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-11-17
  • 修回日期:  2015-12-18
  • 网络出版日期:  2016-11-20

目录

    /

    返回文章
    返回
    常见问答