Skip to main content

CoRSA - A Constraint Based Approach to Requirements and Safety Analysis

  • Conference paper
  • First Online:
  • 373 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1516))

Abstract

In this paper a novel approach for safety analysis of embedded systems is proposed, based on modelling and analysing a system in terms of constraints.

The main contributions of the reported work are: the introduction of a notation for modelling entities of the physical environment and controller, based on expressing state transition models as constraints; and providing procedures for the analysis of these models by resolution of a series of constraint satisfaction problems. In addition the work provides a systematic framework for modelling and analysis in terms of constraints, and can be realised in a constraint based programming language.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. R. Lutz. Analyzing software requirements errors in safety-critical, embedded systems. In Proceedings of the IEEE Symposium on Requirements Engineering, pages 126–133, San Diego, California, January 1993.

    Google Scholar 

  2. A. Saeed, R. de Lemos, and T. Anderson. Safety analysis of requirements specifications for safety-critical software. In ISA Transactions, volume 34, pages 283–295, 1995.

    Article  Google Scholar 

  3. R. Lutz and R. Woodhouse. Experience report: Contributions of SFMEA to requirements analysis. ICRE, 1996.

    Google Scholar 

  4. J.A. McDermid and D. Pumfrey. A development of hazard analysis to aid software design. In Proceedings of the Ninth Annual Conference on Computer Assurance (COMPASS’ 94), pages 17–25, Gaithersburg, MD, July 1994.

    Google Scholar 

  5. N. G. Leveson, S. S. Cha, and T. J. Shimeall. Safety verification of Ada programs using software fault trees. IEEE Software, pages 48–59, July 1991.

    Google Scholar 

  6. J.M. Rushby. Formal methods and certification of critical systems. Technical Report CSL-93-7, SRI International, Menlo Park, CA., December 1993.

    Google Scholar 

  7. B. Dutere and V. Stavridou. Formal requirements of analysis of an avionics control system. IEEE Transactions on Software Engineering, SE-23(1):267–278, May 1997.

    Google Scholar 

  8. A. P. Ravn, H. Rischel, and K. M. Hansen. Specifying and verifying requirements of real-time systems. IEEE Transactions on Software Engineering, SE-19(1):41–55, January 1993.

    Google Scholar 

  9. R. de Lemos A. Saeed and T. Anderson. The role of formal methods in the requirements analysis of safety-critical systems: a train set example. In Proceedings of the 21st Symposium on Fault-Tolerant Computing, Montreal, Canada, June 1991.

    Google Scholar 

  10. M. Cepin et al. An object-based approach to modelling and analysis of failure properties. In P. Daniel, editor, 16th International conference on Safety Reliability and Security (SAFECOMP’97), pages 281–294, York, UK, September 1997. Springer-Verlag.

    Google Scholar 

  11. C.J. Garrett, S.B. Guarro, and G.E. Apostolakis. The dynamic flowgraph methodology for assessing the dependability of embedded siftware systems. IEEE Transactions on Systems, Man and Cybernetics, 25(5):824–840, May 1995.

    Google Scholar 

  12. J.D. Reese and N.G. Leveson. Software Deviation Analysis. PhD thesis, UCI, 1996.

    Google Scholar 

  13. F. C. Furteck. Constraints and Compromise, pages 189–204. Foundations of Secure Computation. Academic Press, 1978.

    Google Scholar 

  14. F. C. Furteck. Specification and verification of real-time, distributed systems using the theory of constraints. In W. Bibel and R. Kowlaski, editors, 5th Conference on Automated Deduction, pages 110–125, Les Arcs, France, July 1980. Springer-Verlag.

    Google Scholar 

  15. Y. Lebbah. Consistency checking by type inference and constraint satisfaction. In P. Daniel, editor, 16th International conference on Safety Reliability and Security (SAFECOMP’97), pages 253–264, York, UK, September 1997. Springer-Verlag.

    Google Scholar 

  16. S. Lajeunesse and A. Rauzy. Using the constraint programming system Toupie for qualitative analysis of industrial systems failures. In ESREL’97 International Conference on Safety and Reliability, pages 2021–2028, Lisbon Portugal, June 1997.

    Google Scholar 

  17. K. Kronlof, editor. Method Integration: concepts and case studies. John Wiley and Sons Ltd, 1993.

    Google Scholar 

  18. J. Gorski and B. Nowicki. Safety analysis based on object-oriented modelling of critical systems. In E. Schoitsch, editor, 15th International conference on Safety Reliability and Security (SAFECOMP’96), pages 46–60, Vienna, Austria, October 1996.

    Google Scholar 

  19. Z. Manna and A. Pnueli. Temporal Verification of Reactive Systems: Safety. Springer-Verlag, 1995.

    Google Scholar 

  20. M. Muller et al. DFKI OZ, 1995.

    Google Scholar 

  21. Z. Manna and A. Pnueli. Models for Reactivity, volume 30. Acta Informatica, 1993.

    Google Scholar 

  22. B. Dasarathy. Timing constraints of real-time systems: Constructs for expressing them, methods of validating them. IEEE Transactions on Software Engineering, SE-11(1):80–86, January 1985.

    Google Scholar 

  23. D. Harel. Statecharts: A visual formalism for complex systems. Science of Computer Programming, 8:231–274, 1987.

    Article  MATH  MathSciNet  Google Scholar 

  24. J.L. Paterson. Petri Net Theory and the Modeling of Systems. Prentice-Hall, 1981.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg Berlin Heidelberg

About this paper

Cite this paper

Hollingworth, K., Saeed, A. (1998). CoRSA - A Constraint Based Approach to Requirements and Safety Analysis. In: Ehrenberger, W. (eds) Computer Safety, Reliability and Security. SAFECOMP 1998. Lecture Notes in Computer Science, vol 1516. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49646-7_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-49646-7_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65110-9

  • Online ISBN: 978-3-540-49646-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics