FPTC: Automated Safety Analysis for Domain-Specific Languages

  • Richard F. Paige
  • Louis M. Rose
  • Xiaocheng Ge
  • Dimitrios S. Kolovos
  • Phillip J. Brooke
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5421)

Abstract

Critical systems must be shown to be acceptably safe to deploy and use in their environment. The size, scale, heterogeneity, and distributed nature of these increasingly complex systems makes them difficult to verify and analyse. Additionally, domain experts use a variety of languages to model and build their systems. We present an automated safety analysis technique, Fault Propagation and Transformation Analysis, and explain how it can be used for automatically calculating the failure behaviour of an entire system from the failure behaviours of its components. We outline an implementation of the technique in the Epsilon model management platform, allowing it to be used with state-of-the-art model management languages and tools, and making it applicable to a variety of different domain-specific modelling languages.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Conmy, P., Paige, R.: Challenges when using Model-Driven Architecture in the development of safety critical software. In: Proceedings of 4th Workshop on Model-Based Methodologies for Pervasive and Embedded Software. IEEE Computer Society Press, Los Alamitos (2007)Google Scholar
  2. 2.
    Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Systems Journal 45(3), 621–646 (2006)CrossRefGoogle Scholar
  3. 3.
    Efftinge, S.: xText reference document (2007), www.eclipse.org/gmt/oaw
  4. 4.
    Fenelon, P., McDermid, J.A.: An integrated toolset for software safety analysis. The Journal of Systems and Software 21(3), 279–290 (1993)CrossRefGoogle Scholar
  5. 5.
    Grunske, L.: Towards an integration of standard component-based safety evaluation techniques with saveCCM. In: Hofmeister, C., Crnković, I., Reussner, R. (eds.) QoSA 2006. LNCS, vol. 4214, pp. 199–213. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Heitmeyer, C.L., Kirby, J., Labaw, B.G., Archer, M., Bharadwaj, R.: Using abstraction and model checking to detect safety violations in requirements specifications. IEEE Trans. Software Eng. 24(11), 927–948 (1998)CrossRefGoogle Scholar
  7. 7.
    IEC. Analysis techniques for system reliability: Procedures for failure mode and effect analysis. International Standard 812. IEC Geneva (1985)Google Scholar
  8. 8.
    Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42–77. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Kolovos, D., Paige, R., Polack, F.: The Epsilon Transformation Language. In: Vallecillo, A., Gray, J., Pierantonio, A. (eds.) ICMT 2008. LNCS, vol. 5063, pp. 46–60. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  10. 10.
    Kolovos, D., Paige, R., Polack, F.: On the evolution of OCL for capturing structural constraints in modelling languages. In: Rigorous Object-Oriented Methods. Springer, Heidelberg (2008)Google Scholar
  11. 11.
    Kolovos, D.S., Paige, R.F.: Epsilon model management platform (2008), www.eclipse.org/gmt/epsilon
  12. 12.
    Kolovos, D.S., Paige, R.F., Polack, F.: The Epsilon Object Language (EOL). In: Rensink, A., Warmer, J. (eds.) ECMDA-FA 2006. LNCS, vol. 4066, pp. 128–142. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    McDermid, J.A., Nicholson, M., Pumfrey, D.J., Fenelon, P.: Experience with the application of HAZOP to computer-based systems. In: Compass 1995: 10th Annual Conference on Computer Assurance, Gaithersburg, Maryland, pp. 37–48. National Institute of Standards and Technology (1995)Google Scholar
  14. 14.
    Simpson, H.R.: The MASCOT method. Software Engineering Journal 1(3), 103–120 (1986)CrossRefGoogle Scholar
  15. 15.
    Wallace, M.: Modular architectural representation and analysis of fault propagation and transformation. In: FESCA 2005. ENTCS. Elsevier, Amsterdam (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Richard F. Paige
    • 1
    • 2
  • Louis M. Rose
    • 1
    • 2
  • Xiaocheng Ge
    • 1
    • 2
  • Dimitrios S. Kolovos
    • 1
    • 2
  • Phillip J. Brooke
    • 1
    • 2
  1. 1.Department of Computer ScienceUniversity of YorkUK
  2. 2.School of ComputingUniversity of TeessideUK

Personalised recommendations