Safety requirements analysis method based on control characteristics of scenarios
-
摘要: 安全性需求是系统安全性保证的关键。随着系统复杂度和耦合度的剧增,安全性需求的分析提取日益困难。通过对系统需求场景的控制结构和过程分析建模,提出描述控制过程中系统变量间关系的变量影响图模型,进一步给出了安全性需求分析方法。通过该方法,使用变量影响图等对控制过程进行分析,生成基于系统理论事故模型和过程(STAMP)的危险性控制活动,并以此获得系统安全性需求。经实验验证,所提出的安全性需求分析方法在正确性和一致性方面具有较好的效果。Abstract: Safety requirements are critical to ensure the system safety. With the increase of system complexity and coupling degree, it becomes more difficult to analyze and extract the safety requirements. We construct the variables effect graph which describes the relationships among system variables in the control process through control structure and process analysis modeling for the system scenario. Then we present a safety requirements analysis method. By using the method, the control process is analyzed with variables effect graph etc., and the hazardous control actions based on the systems-theoretic accident model and process (STAMP) are created, and thereby the system safety requirements are generated. The experimental results show that our method is effective on correctness and consistency.
-
Key words:
- safety requirements /
- requirements analysis /
- control analysis /
- scenario analysis /
- control modeling
-
[1] FLEMING C H,SPENCER M,THOMAS J,et al.Safety assurance in NextGen and complex transportation systems[J].Safety Science,2013,55:173-187. [2] LEVESON N G.Engineering a safer world:Systems thinking applied to safety[M].Boston,Massachusetts:MIT Press,2012:212-227. [3] BLACK J,KOOPMAN P.Indirect control path analysis and goal coverage strategies for elaborating system safety goals in composite systems[C]//Proceedings of the 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing.Piscataway,NJ:IEEE Press,2008:184-191. [4] SUPAKKUL S,CHUNG L.Applying a goal-oriented method for hazard analysis:A case study[C]//Proceedings of the 4th International Conference on Software Engineering Research,Management and Applications.Piscataway,NJ:IEEE Press,2006:22-30. [5] FIRESMITH D.Engineering safety-related requirements for software-intensive systems[C]//Proceedings of the 27th International Conference on Software Engineering.Piscataway,NJ:IEEE Press,2005:720-721. [6] FIRESMITH D.Engineering safety requirements,safety constraints,and safety-critical requirements[J].Journal of Object Technology,2004,3(3):27-42. [7] CHUNG L,SUPAKKUL S.Capturing and reusing functional and non-functional requirements knowledge:A goal-object pattern approach[C]//2006 IEEE International Conference on Information Reuse and Integration.Piscataway,NJ:IEEE Press,2006:539-544. [8] FIRESMITH D.A taxonomy of safety-related requirements[C]//2004 Proceedings of the Workshop on Requirements for High Assurance Systems (RHAS'04).Piscataway,NJ:IEEE Press,2004:11. [9] CHANG W,BAO X,LI X.A study on airborne software safety requirements patterns[C]//2013 IEEE 7th International Conference on Software Security and Reliability.Piscataway,NJ:IEEE Press,2013:131-136. [10] CHEN Z,MOTET G.System safety requirements as control structures[C]//2009 33rd Annual IEEE International Computer Software and Applications Conference.Piscataway,NJ:IEEE Press,2009:324-331. [11] YANG C.Software safety testing based on STPA[C]//3rd International Symposium on Aircraft Airworthiness (ISAA).Amsterdam:Elsevier,2014,80:399-406. [12] ALLENBY K,KELLY T.Deriving safety requirements using scenarios[C]//5th IEEE International Symposium on Requirements Engineering.Piscataway,NJ:IEEE Press,2001:228-235. [13] VYAS P,MITTAL R K.Eliciting additional safety requirements from use cases using SFTA[C]//2012 1st International Conference on Recent Advances in Information Technology.Piscataway,NJ:IEEE Press,2012:163-169. [14] GUILLERM R,DEMMOU H,SADOU N.A safety requirement engineering method and tool[C]//2013 21st IEEE International Conference on Requirements Engineering.Piscataway,NJ:IEEE Press,2013:328-329. [15] MENON C,KELLY T.Eliciting software safety requirements in complex systems[C]//2010 4th Annual IEEE Systems Conference.Piscataway,NJ:IEEE Press,2010:616-621. [16] THOMAS J P.Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis[D].Boston,Massachusetts:MIT,2013:71-87. [17] ASHBY W R.An introduction to cybernetics[M].London:Chapman & Hall,1957:202-216. [18] CHECKLAND P.Systems thinking,systems practice[M].New York:John Wiley & Sons,1981:271-284. [19] VANHATALO J,VÖLZER H,LEYMANN F.Faster and more focused control-flow analysis for business process models through SESE decomposition[C]//5th International Conference on Service-Oriented Computing(ICSOC 2007).Berlin:Springer,2007,4749:43-55. [20] FLEMING C H.Safety-driven early concept analysis and development[D].Boston,Massachusetts:MIT,2015:53-92. [21] INGHAM M D,RASMUSSEN R D,BENNETT M B,et al.Generating requirements for complex embedded systems using state analysis[J].Acta Astronautica,2006,58(12):648-661. [22] LEVESON N G.A systems-theoretic approach to safety in software-intensive systems[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):66-86. [23] ABDULKHALEQ A,WAGNER S.A-STPA:An open tool support for system-theoretic process analysis[C]//2014 STAMP Conference.Boston,Massachusetts:MIT Press,2014.
点击查看大图
计量
- 文章访问数: 851
- HTML全文浏览量: 130
- PDF下载量: 442
- 被引次数: 0