No: 1 CEMSIS 1 Potential for influencing standards and broadening collaboration N. Thuy EDF R&D.

Slides:



Advertisements
Similar presentations
Supporting further and higher education JISC VRE Programme Quality Planning 12/01/05.
Advertisements

Supporting further and higher education Quality Planning Richard McKenna JISC.
Module 1 Evaluation Overview © Crown Copyright (2000)
Transition from Q1- 8th to Q1- 9th edition
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Off-The-Shelf Software Components in systems important to safety (EPR - European Pressurized water Reactor) Nguyen N.Q. THUY RESEARCH AND DEVELOPMENT DIVISION.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
1 Certification Chapter 14, Storey. 2 Topics  What is certification?  Various forms of certification  The process of system certification (the planning.
Project Support Function PM Planning Organizing Staffing Monitoring Controlling and Leading Project Support Functions Monitoring Controlling.
1 Software Testing and Quality Assurance Lecture 31 – Testing Systems.
Introduction ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
Information and communication technology (ICT) capability Australian Curriculum, F10.
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
Conducting the IT Audit
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
SEC835 Database and Web application security Information Security Architecture.
INTEGRATION OF QA/ISM J. R. Yanek Chair, EFCOG ISM Working Group April 13, 2000.
Software Engineering Term Paper
Software Development *Life-Cycle Phases* Compiled by: Dharya Dharya Daisy Daisy
No: 1 CEMSIS 1 WP3 - Use of pre-developed products Key issues N. Thuy EDF R&D.
1 Assessment Topics, Part 1 Thuy Nguyen and Ray Torok Joint IAEA - EPRI Workshop on Modernization of Instrumentation and Control Systems in NPPs
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
TWG-NPPIC, May 2009, Vienna: UK status1 Current status of NPP I&C in the United Kingdom T P Smyth AMEC, Knutsford, Cheshire, UK 22 nd Meeting of the Technical.
Product Documentation Chapter 5. Required Medical Device Documentation  Business proposal  Product specification  Design specification  Software.
What is HQPD?. Ohio Standards for PD HQPD is a purposeful, structured and continuous process that occurs over time. HQPD is a purposeful, structured and.
Essentials of Machine Safety Standards in Perspective.
Safety Critical Systems ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University.
No: 1 CEMSIS wp6_beg037_v0_2_fisa 2003 slides.ppt CEMSIS FIKS-CT Cost-Effective Modernisation of Systems Important to Safety Deryk Pavey, Deryk.
Made by: Mudassar Iqbal 1 INTEGRATION OF IT PLAN IN SCHOOL SYSTEM.
SAFM 550 #3 Insurance Personnel SAFM 550 Personnel Roles l Agent l Underwriter l Loss Control Representative l Claims Adjuster l Premium Auditor.
Open Platform for EvolutioNary Certification Of Safety-critical Systems Large-scale integrating project (IP) Nuanced Term-Matching to Assist in Compositional.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 9 Slide 1 Critical Systems Specification 1.
Use of Fieldbus in safety related systems, an evaluation study of WorldFIP according to proven-in-use concept of IEC Jean Pierre Froidevaux WorldFIP.
February 15, 2004 Software Risk Management Copyright © , Dennis J. Frailey, All Rights Reserved Simple Steps for Effective Software Risk Management.
Technical Assistance Office SOCRATES / Lingua 1 and 2 Information seminar for co-ordinators of successful pre-proposals Carla Donda 28 January 2005.
Configuration Management for Digital Upgrades Configuration Management Benchmarking Group 2008 Conference Scott Patterson Program Manager for I&C Obsolescence.
Over View of CENELC Standards for Signalling Applications
5 th May 2009 Assurance, Confidence and Software Safety Dr. Richard Hawkins.
Software Integrity and Cyber Security NAMEPA: Managing Change in a Changing World Jim Watson Division President & COO, Americas Division Management New.
1 Post FISA-2003 Workshop Cost Effective Modernisation of Systems Important to Safety CEMSIS (Luxembourg, 13 Nov. 2003) Regulatory Aspects F. Seidel (Federal.
How to develop E/E/PESs to IEC 61508?
Attributes Availability Reliability Safety Confidentiality Integrity Maintainability Dependability Means Fault Prevention Fault Tolerance Fault Removal.
Marco Antonio Bayout Alvarenga National Commission of Nuclear Energy (CNEN), Brazil 14 December 2015 Experience in the use of Human Factors Engineering.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
About Us! Rob StockhamBA IEng MIEE General Manager Moore Industries-Europe, Inc MemberIEE Honorary Secretary ISA England Institute of Directors DirectorThe.
Governance, risk and ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
30 minutes introduction to Project Auditing Project Management & Project Audits.
ERM Seminar – Institute of Actuaries of India Mart 2017
A Canadian government agency responsible for administering social services programs implements IBM Cúram to streamline processes, reduce errors and fraud,
PERSONAL SAFETY INTERLOCKS External EHS Expert Panel Workshop
W. Geoffrey Gabbott USDA FSA Contracting Officer
The move from a rule based system to a risk based system Challenges for the competent authorities October 2017.
How will the 3rd Energy Package Impact GRI NW ?
Regulation (EU) No 2015/1136 on CSM Design Targets (CSM-DT)
Data Managers’ Forum What’s in it for us?
Assessment & Grading Criteria for Unit 19
A Canadian government agency responsible for administering social services and disability support programs implements IBM Cúram to create a more fair,
Autonomous Robotics in the Nuclear Industry
HSE Case: Risk Based Approach.
BU IS GIG Chemical, Oil & Gas
Safety Case Components and Documentation
Software Engineering: A Practitioner’s Approach, 6/e Chapter 2 Process: A Generic View copyright © 1996, 2001, 2005 R.S. Pressman & Associates, Inc.
Instrument PDR Summary of Objectives
IAEA – Safety Demonstration of Advanced Water Cooled Nuclear Power Plants Session: Digital I&C Systems Topic: Defence in Depth & Diversity – Challenges.
Functional Safety Expert
Safety Integrity Level (SIL) Classification
Benefits of IEC and introduction into new EN 14971:2012
CEMSIS FIKS-CT Cost-Effective Modernisation of Systems Important to Safety Deryk Pavey, wp6_beg037_v0_2_fisa 2003 slides.ppt.
ISO and TR Update for FDA Regulated Industries
Presentation transcript:

no: 1 CEMSIS 1 Potential for influencing standards and broadening collaboration N. Thuy EDF R&D

CEMSIS WP3_edf036_v01_FISA_November 2003 no: 2 Rule-based approaches vs. Claim-based approaches u Rule-based approaches l rules that give (reasonable) assurance for given properties l often: too rigid u Claim-based approaches l may be necessary for specific, unanticipated, or new issues l example: the RID3 project (EPRI)

CEMSIS WP3_edf036_v01_FISA_November 2003 no: 3 RID3 u Risk Informed Defense in Depth and Diversity l for digital I&C upgrades u Evaluation of potential for digital Common Cause Failure u Example: use of the same digital I&C platform in several lines of defence l claim: the operating system software is an unlikely source of digital CCF l claim: the application function library is also an unlikely source

CEMSIS WP3_edf036_v01_FISA_November 2003 no: 4 Revision of IEC u Current standard l lists of (highly) recommended methods / techniques l no clear indication of what is to be achieved u Revised standard l identification of essential properties to be achieved at each stage of the system / software safety lifecycles l gradation of the rigour of evidence according to Safety Integrity Level (SIL) —development process, assessment, independent assessment —technical evidence, + objective acceptance criteria, + rigorous reasoning l recommendation of methods / techniques —that may be used to achieve these properties —that meet the expected level of rigour (SIL)