2008
DOI: 10.1049/iet-sen:20070050
|View full text |Cite
|
Sign up to set email alerts
|

Integration of safety analysis in model-driven software development

Abstract: Safety critical software requires integrating verification techniques in software development methods. Software architectures must guarantee that developed systems will meet safety requirements and safety analyses are frequently used in the assessment. Safety engineers and software architects must reach a common understanding on an optimal architecture from both perspectives. Currently both groups of engineers apply different modelling techniques and languages: safety analysis models and software modelling lan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(24 citation statements)
references
References 2 publications
0
24
0
Order By: Relevance
“…They map a fault tree to a PN using a set of mapping rules (FT-PN). Miguel et al [8] introduce a model driven development approach and the use of a platform-independent language to bridge the gap between safety analyses (FTA and failure mode effects and criticality analysis) and software development languages such as UML.…”
Section: Integration Of Safety Analysis Techniques and Behavior Mod Elsmentioning
confidence: 99%
“…They map a fault tree to a PN using a set of mapping rules (FT-PN). Miguel et al [8] introduce a model driven development approach and the use of a platform-independent language to bridge the gap between safety analyses (FTA and failure mode effects and criticality analysis) and software development languages such as UML.…”
Section: Integration Of Safety Analysis Techniques and Behavior Mod Elsmentioning
confidence: 99%
“…However this practice is subjective to the kind of people consisting of the Tiger Team and thus is non-reproducible [5]. There have been some approaches which focus on the process which is adopted while the software is being developed to access the security of final product [5]. One example of this is the SSECMM or Systems Security Engineering Capability Maturity Model.…”
Section: Related Workmentioning
confidence: 99%
“…There have been some attempts to quantify the security of software system by means of Tiger Team Penetration practices, where a group of experts sit together and try to break in by exploiting any weakness it might possess. However this practice is subjective to the kind of people consisting of the Tiger Team and thus is non-reproducible [5]. There have been some approaches which focus on the process which is adopted while the software is being developed to access the security of final product [5].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They concentrate on recurring safety analysis model constructs and automatically construct parts of the safety analysis model at a high level. The annotations presented in [4] can be applied to all elements of the design model. The used annotations are generically defined to cover the whole design space and to allow a detailed deduction of the safety analysis model.…”
Section: Introductionmentioning
confidence: 99%