Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.

Slides:



Advertisements
Similar presentations
Presentation for the INCOSE Symposium 2011 Denver, CO USA1 Validation: Losing its Differentiation Jim Armstrong.
Advertisements

Requirements gathering
Strategic Management & Planning
E-OCVM (Version 2) Explained Episode 3 - CAATS II Final Dissemination Event Alistair Jackson EUROCONTROL Episode 3 Brussels, 13 & 14 Oct 2009.
Software Processes Coherent sets of activities for specifying, designing, implementing and testing software systems.
Auditing Concepts.
Project management Project manager must;
Illustration of the Information Model for Complex System Modeling: from Requirement to V&V Illustration of the Information Model for Complex System Modeling:
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Overview of Software Requirements
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
Introduction to Computer Technology
Enterprise Architecture
Chapter 3 Software Processes.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Overview of the Database Development Process
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Chapter 6 Requirements Engineering Process.
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Requirements Engineering Processes l Processes used to discover, analyse and.
Ways for Improvement of Validity of Qualifications PHARE TVET RO2006/ Training and Advice for Further Development of the TVET.
Requirements Elicitation. Who are the stakeholders in determining system requirements, and how does their viewpoint influence the process? How are non-technical.
Effective Requirements Management – an overview Kristian Persson Field Product Manager, Telelogic Asia/Pacific.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Intent Specification Intent Specification is used in SpecTRM
TEN-T Experts Briefing, March Annual Call Award Criteria.
United States Department of Agriculture Food Safety and Inspection Service 1 National Advisory Committee on Meat and Poultry Inspection August 8-9, 2007.
MAINSTREAMING MONITORING AND EVALUATION IN EDUCATION Can education be effectively managed without an M & E system in place?
Verification and Validation in the Context of Domain-Specific Modelling Janne Merilinna.
Lecture 7: Requirements Engineering
1 Introduction to Software Engineering Lecture 1.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Historical Aspects Origin of software engineering –NATO study group coined the term in 1967 Software crisis –Low quality, schedule delay, and cost overrun.
1 15 quality goals for requirements  Justified  Correct  Complete  Consistent  Unambiguous  Feasible  Abstract  Traceable  Delimited  Interfaced.
Creating a European entity Management Architecture for eGovernment CUB - corvinus.hu Id Réka Vas
Systems Development Life Cycle
27/3/2008 1/16 A FRAMEWORK FOR REQUIREMENTS ENGINEERING PROCESS DEVELOPMENT (FRERE) Dr. Li Jiang School of Computer Science The.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Toulouse, September 2003 Page 1 JOURNEE ALTARICA Airbus ESACS  ISAAC.
1 Software Engineering: A Practitioner’s Approach, 6/e Chapter 15a: Product Metrics for Software Software Engineering: A Practitioner’s Approach, 6/e Chapter.
International Atomic Energy Agency Regulatory Review of Safety Cases for Radioactive Waste Disposal Facilities David G Bennett 7 April 2014.
SAFEWARE System Safety and Computers Chap18:Verification of Safety Author : Nancy G. Leveson University of Washington 1995 by Addison-Wesley Publishing.
Software Requirements Specification Document (SRS)
Petter Nielsen Information Systems/IFI/UiO 1 Systems development Methodologies IN364.
Requirements Analysis
 CMMI  REQUIREMENT DEVELOPMENT  SPECIFIC AND GENERIC GOALS  SG1: Develop CUSTOMER Requirement  SG2: Develop Product Requirement  SG3: Analyze.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
Quality Assurance in the Presence of Variability Kim Lauenroth, Andreas Metzger, Klaus Pohl Institute for Computer Science and Business Information Systems.
© 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1 Product Design Alternative Generation, Evaluation, and Selection.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Verification vs. Validation Verification: "Are we building the product right?" The software should conform to its specification.The software should conform.
 The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the requirements.  However,
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
1 Design and evaluation methods: Objectives n Design life cycle: HF input and neglect n Levels of system design: Going beyond the interface n Sources of.
Auditing Concepts.
Project Planning: Scope and the Work Breakdown Structure
DATA COLLECTION METHODS IN NURSING RESEARCH
Critical systems design
Software Life Cycle Models
Strategic Management & Planning
Systems Engineering for Mission-Driven Modeling
Engineering Processes
Lecture # 7 System Requirements
Power point presentation DR.Shareef Mahgoub
CEng progression through the IOM3
Presentation transcript:

Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom

Outline General context and motivation System engineering Safety integration approach Conclusion and perspectives 2

General context Nowadays systems are complex More and more functionalities More and more technologies  design process more and more complex Stronger constraints of dependability (Standards, …) Hard competition (cost and time…) 3

General context Performing of important system level properties, such as safety and security, become difficult. These properties must be built at the beginning of system design; they cannot be added on or simply measured afterward. Dependability of complex systems relies heavily on the emergent properties that result from the complex interdependencies that exist among the involved systems and their environments. It seems that the dependability properties of these systems must be addressed in an overall study. 4

General context Weaknesses of the current safety processes can be resumed in the following points (non exhaustive list) : Safety analysis involves some degree of intrinsic uncertainty. So, there is a degree of subjectivity in the identification of safety issues. Different groups need to work with different views of the system (e.g. systems engineers’ view, safety engineer’s view). This is generally a benefit but it can be a weakness if the views are not consistent. Definition of the safety requirements and their formalization. Traceability of safety requirements. Solution: take into account the safety with a general point of view, early in the design. 5

Motivation Proposition of complex systems conception framework: Complete Coherent Integration of safety evaluation activities and the design (development) activities Proposal approach: System Engineering as framework global approach of safety in this framework 6

System Engineering Definition System Engineering is a general methodological approach that encompasses all activities appropriate to design, develop and test a system providing efficient and economical solution to client's needs while satisfying all stakeholders. Paradigm : processes-methods-tools 7 ProcessesMethodsTools Rely on

System Engineering Standard EIA-632 8

System Engineering Standard EIA-632 9

Safety integration approach The starting point of the work presented in this paper is the following note provided in EIA-632 standard: Note: Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. Approach: Guide for the consideration of the safety in each sub-processes of the EIA-632 standard: translate or refine in terms of safety the processes of the EIA-632 standard. 10

Safety integration approach 11

Safety integration approach 12 R.14 – Acquirer Requirements R.15 – Other Stakeholder Requirements R.16 – System Technical Requirements The developer shall define a validated set of acquirer (other stakeholder) requirements for the system, or portion thereof. In the safety framework: Acquirer requirements, generally, correspond to constraints in the system. It is necessary to identify and collect all constraints imposed by acquirer to obtain a dependable system. A hierarchical organization associates weight to safety requirements, following their criticality. Safety requirements can be derived from certification or quality requirements or can be explicitly expressed by acquirer or other stakeholder.

Safety integration approach 13 R.14 – Acquirer Requirements R.15 – Other Stakeholder Requirements R.16 – System Technical Requirements The developer shall define a validated set of system technical requirements from the validated sets of acquirer requirements and other stakeholder requirements. Concerning safety: System technical requirements traduce system performances It consists on defining safety attributes (SIL level, MTBF (1), MTTR (2), failure rate,…) Technical requirements can be derived from a preliminary hazard analysis. Some standard can help designer to define safety requirements. Example in civil aerospace sector: ARP4754 and ARP (1) Mean Time Between Failure, (2) Mean Time To Repair

Safety integration approach 14

Safety integration approach 15 R.17 – Logical Solution Representations R.18 – Physical Solution Representations R.19 – Specified Requirements The developer shall define one or more validated sets of logical solution representations that conform with the technical requirements of the system. The recommendation is to use semi formal / formal models for the solution modeling. The use of formal methods allows for automation of verification and analysis. In this processes, safety analysis techniques will be used to determine the best logical solution.

Safety integration approach 16 R.17 – Logical Solution Representations R.18 – Physical Solution Representations R.19 – Specified Requirements The developer shall define a preferred set of physical solution representations that agrees with the assigned logical solution representations, derived technical requirements, and system technical requirements. The physical solution representations are derived from logical solution representation and must respects all requirements, particularly safety requirements. The same safety analysis may be done for the physical solution representations. The same recommendations than for logical solution remain true.

Safety integration approach 17

Safety integration approach 18 R.22 – Effectiveness Analysis R.23 – Tradeoff Analysis R.24 – Risk Analysis The developer shall perform risk analyses to develop risk management strategies, support management of risks, and support decision making. Techniques: Fault tree ; Failure Mode, Effect, and Criticality Analysis; … Determines the risks of the system Can generate safety requirements other than that defined by the acquirer and other stakeholders.

Safety integration approach 19

Safety integration approach 20 R.25 – Requirement Statements Validation R.26 – Acquirer Requirements Validation R.27 – Other Stakeholder Requirements Validation R.28 – System Technical Requirements Validation R.29 – Logical Solution Representations Validation Requirements Validation is critical to successful system product. Requirements are validated when it is certain that they describe the input requirements and objectives such that the resulting system products can satisfy them. A great attention is done to traceability analysis. Like other requirements, safety requirements must be validated. The validation allows designing safe system. To facilitate this step, semi-formal solutions, like UML or SysML, can be used for good formulation of requirements.

Safety integration approach 21

Safety integration approach 22 R.30 – Design Solution Verification R.31 – End Product Verification R.32 – Enabling Product Readiness The System Verification Process is used to ascertain that: The generated system design solution is consistent with its source requirements, in particular safety requirements. Some traceability models allow defining the procedure of verifying safety requirement. These procedures are planned at the definition of safety requirement. Simulation is a good and current method used to achieve system verification Other methods: virtual prototyping, model checking,…

Conclusion and Perspectives Approach integrating safety in system engineering process Based on the EIA-632 Standard Processes -> Methods -> Tools MDE (Model Driven Engineering) approach Using SysML and AADL Focusing on traceability, with a SysML data model 23

Questions 24 ?