Method for Generating a Diverse Set of Requirements for Safety-Critical Systems

被引:0
作者
Maurio, Joseph [1 ]
McClure, Christopher [1 ]
机构
[1] Northrop Grumman Corp, Sykesville, MD 21157 USA
来源
2014 CONFERENCE ON SYSTEMS ENGINEERING RESEARCH | 2014年 / 28卷
关键词
requirements; taxonomy; diversity; safety-critical;
D O I
10.1016/j.procs.2014.03.057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic digital safety-critical systems are often architected with redundant hardware in order to combat the effects of a single failure that could prevent the system from performing its safety function. Additionally, diverse hardware and software are typically employed to guard against any potential common-cause failures that would likewise cause an inability of the system to carry out its safety function. An all digital (processor or programmable logic-based) implementation usually requires the development of two digital systems by two separate software (and frequently hardware) teams which operate in parallel to provide the safety function. Strict rules are applied to the development process to ensure that the separate teams do not share information or influence each other's designs. Even though this technique provides a means to develop a diverse set of digital safety-critical equipment, the system design still begins with a single set of requirements. Therefore, it is conceivable that the two design teams may create solutions that contain identical design elements. Any flaws or vulnerabilities in the common elements would then be shared between the two designs making the system vulnerable to common-cause failures thus defeating the benefit of utilizing diverse design teams. A method is proposed herein to address this limitation. This method entails the classification of the individual requirements of the source specification according to a detailed hierarchical taxonomy and the subsequent altering of the classified requirements. The taxonomy is structured so that the leaf-level classifiers are mutually exclusive or uncorrelated and the classified requirements are altered to be more stringent. The original and constrained requirements are allocated to two specifications documents in such a way that for certain requirements, the original version appears in the specification for one design team and the constrained version appears in the specification for the other. By using this process, sufficient requirements diversity results increasing the likelihood the two separate development teams will achieve a greater degree of design and implementation diversity than two teams using the same set of requirements. This increased product diversity should ultimately result in fewer latent common-cause faults residing in the two diverse systems. Furthermore, the degree of diversity achieved is expected to be greater when requirements diversity is employed, as compared to a traditional approach in which diversity is achieved by chance. (C) 2014 The Authors. Published by Elsevier B.V.
引用
收藏
页码:465 / 472
页数:8
相关论文
共 50 条
  • [11] SysML Extensions for Safety-Critical Mechatronic Systems Design
    Mhenni, Faida
    Choley, Jean-Yves
    Nguyen, Nga
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (ISSE) PROCEEDINGS, 2015, : 242 - 247
  • [12] Ontology-based Requirements Generation for Credibility Validation of Safety-critical System
    Li, Rui
    Ma, Shilong
    Yao, Wentao
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 849 - 854
  • [13] HMI Requirements Creation, as the Collaboration Work of Human and Machine in the Safety-Critical System
    Ito, Masao
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2017), 2017, 748 : 61 - 71
  • [14] A Confidence-based Software Voter for Safety-Critical Systems
    Rezaee, Mohammadreza
    Sedaghat, Yasser
    Khosravi-Farmad, Masoud
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 196 - 201
  • [15] Secure and safety-critical vs. insecure, non safety-critical embedded systems: Do they require completely different design approaches?
    Marwedel, P
    Gebotys, C
    INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN AND SYSTEM SYNTHESIS, 2004, : 72 - 73
  • [16] An Integrated Approach to Scheduling in Safety-Critical Embedded Control Systems
    I. Bate
    A. Burns
    Real-Time Systems, 2003, 25 : 5 - 37
  • [17] An integrated approach to scheduling in safety-critical embedded control systems
    Bate, I
    Burns, A
    REAL-TIME SYSTEMS, 2003, 25 (01) : 5 - 37
  • [18] Efficient engineering of safety-critical, software-intensive systems
    Taiber, Joachim
    McGregor, John D.
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 836 - 841
  • [19] User-Centered Requirements for Augmented Reality as a Cognitive Assistant for Safety-Critical Services
    Braeker, Julia
    Osterbrink, Anna
    Semmann, Martin
    Wiesche, Manuel
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2023, 65 (02) : 161 - 178
  • [20] A computer aided design tool for the identification and linkage of safety-critical factors to their mitigating requirements
    Ferguson, F
    Gill, JA
    COMPUTERS AND THEIR APPLICATIONS, 2001, : 310 - 313