Advertisement

SAFECOMP ’93 pp 219-229 | Cite as

Robust Requirements Specifications for Safety—Critical Systems

  • Amer Saeed
  • Rogério de Lemos
  • Tom Anderson
Conference paper

Abstract

Experience in safety-critical systems has shown that deviations from assumed behaviour can and do cause accidents. This suggests that the development of requirements specifications for such systems should be supported with a risk analysis. In this paper we present an approach to the development of robust requirements specifications (i.e. specifications that are adequate for the risks involved), based on qualitative and quantitative analyses.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson T, de Lemos R, Fitzgerald J S, Saeed A. On Formal Support for Industrial—Scale Requirements Analysis. In: Ravn A P, Rischel H (eds) Proceedings of the Workshop on Theory of Hybrid Systems. Lyngby, Denmark. Springer-Verlag, 1993 (Lecture notes in computer science — to appear)Google Scholar
  2. 2.
    Leveson N G. Software Safety: Why, What and How. ACM Computing Surveys 1986; 18: 125–163CrossRefGoogle Scholar
  3. 3.
    Finkelstein A, Kramer J, Nuseibeh B, Finkelstein L, Goedicke, M. Viewpoints: A Framework for Integrating Multiple Perspectives in System Development. International Journal of Software Engineering and Knowledge Engineering 1992; 1: 31–57CrossRefGoogle Scholar
  4. 4.
    de Lemos R, Saeed A, Waterworth A. Exception Handling in Real-Time Software from Specification to Design. Proceedings of the 2nd International Workshop on Responsive Computer Systems. Saitama, Japan. October, 1992. pp 108–121Google Scholar
  5. 5.
    Marshall C W. Applied Graph Theory. Wiley—Interscience, 1971Google Scholar
  6. 6.
    Draft Interim Defence Standard 00-56. Hazards Analysis and Safety Classification of the Computer and Programmable Electronic System Elements of Defence Equipment. UK Ministry of Defence. London, UK, 1991Google Scholar
  7. 7.
    Vesely W E, Goldberg F F, Roberts N H, Haasl, D F. Fault Tree Handbook. US Nuclear Regulatory Commission NUREG-0492. Washington, DC, 1981Google Scholar
  8. 8.
    Leveson N G, Cha S S, Shimeall T J. Safety Verification of Ada Programs using Software Fault Trees. IEEE Software 1991; 4:48–59CrossRefGoogle Scholar
  9. 9.
    Miller D G. The Role of Statistical Modeling and Inference in Software Quality Assurance. In: de Neumann B (ed) Software Certification. Elsevier Applied Science, 1990, pp 135–152Google Scholar
  10. 10.
    Ramamoorthy C V, Tsai N-T, Yamura T, Bhide A. Metrics Guided Methodology. Proceedings 9th International Computer Software and Applications Conference — COMPSAC’85. Chicago, IL. October, 1985. pp 111–120Google Scholar
  11. 11.
    Laprie, J-C. For a Product-in-a-Process Approach to Software Reliability Evaluation. Proceedings of the 3rd International Symposium on Software Reliability Engineering. Research Park Triangle, NC. October, 1992. pp 134–139CrossRefGoogle Scholar
  12. 12.
    Wohlin C, Runeson, P. A Method for Early Software Reliability Estimation. Proceedings of the 3rd International Symposium on Software Reliability Engineering. Research Park Triangle, NC. October, 1992. pp 156–165CrossRefGoogle Scholar
  13. 13.
    de Lemos R, Saeed A, Anderson T. A Train set as a Case Study for the Requirements Analysis of Safety—Critical Systems. The Computer Journal 1992; 35: 30–40CrossRefGoogle Scholar
  14. 14.
    Saeed A, de Lemos R, Anderson T. An Approach to the Assessment of Requirements Specifications for Safety-Critical Systems. Computing Laboratory TR 381. University of Newcastle upon Tyne, UK, 1992Google Scholar

Copyright information

© Springer-Verlag London Limited 1993

Authors and Affiliations

  • Amer Saeed
    • 1
  • Rogério de Lemos
    • 1
  • Tom Anderson
    • 1
  1. 1.Department of Computing ScienceUniversity of NewcastleNewcastle upon TyneUK

Personalised recommendations