Skip to main content

Automated Evidence Analysis of Safety Arguments Using Digital Dependability Identities

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2019)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11698))

Included in the following conference series:

Abstract

Creating a sound argumentation of why a system is sufficiently safe is a major part of the assurance process. Today, compiling a safety case and maintaining its validity after changes are time-consuming manual work performed by safety experts based on their experience and knowledge. This work is further complicated when supplier components need to be integrated where important details might not be known. By using the concept provided by Digital Dependability Identities (DDI), we present an approach to automatically check evidence validity for safety requirements through leveraging from formal traceability between safety argument and evidence models being both parts of the DDI. This approach reduces the effort for creating and maintaining the system-level safety argument by (a) performing automated evidence analysis for safety requirements, (b) supporting a model-based multi-tier safety engineering process and (c) eliminating the human error source by relying on DDI scripts to encode safety engineering activities. We illustrate our approach using a case study from the railway domain, which focuses on the safety assurance of a train control system (ETCS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    see http://www.deis-project.eu/ and https://github.com/DEIS-Project-EU/.

  2. 2.

    https://www.eclipse.org/epsilon/.

References

  1. DEIS Project Consortium: Project Publications. http://www.deis-project.eu/dissemination/. Accessed 30 May 2019

  2. European Committee for Electrotechnical Standardization (CENELEC): CENELEC EN 50129: Railway application - Communications, signaling and processing systems - Safety related electronic systems for signaling (2003)

    Google Scholar 

  3. International Organization for Standardization (ISO): ISO 26262: Road vehicles — Functional safety (2011)

    Google Scholar 

  4. Kaiser, B., Liggesmeyer, P., Mäckel, O.: A new component concept for fault trees. In: Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software (2003)

    Google Scholar 

  5. Kelly, T.P.: Systematic approach to safety case management. In: Proceedings of SAE 2004 World Congress (2004)

    Google Scholar 

  6. Kelly, T., Weaver, R.: The goal structuring notation - a safety argument notation. In: Proceedings of the dependable systems and networks workshop (2004)

    Google Scholar 

  7. Object Management Group: Structured Assurance Case Metamodel 2.0 (SACM) (2018). https://www.omg.org/spec/SACM/

  8. Papadopoulos, Y., McDermid, J.A.: Hierarchically performed hazard origin and propagation studies. In: Felici, M., Kanoun, K. (eds.) SAFECOMP 1999. LNCS, vol. 1698, pp. 139–152. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48249-0_13

    Chapter  Google Scholar 

  9. Pohl, K., Hönninger, H., Achatz, R., Broy, M. (eds.): Model-Based Engineering of Embedded Systems – The SPES 2020 Methodology. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34614-9

    Book  Google Scholar 

  10. Schneider, D., et al.: WAP: digital dependability identities. In: IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 324–329 (2015)

    Google Scholar 

  11. UNISIG: ETCS/ERTMS Safety Requirements for the Technical Interoperability of ETCS in Levels (Subset-091, Issue: 3.6.0) (2015)

    Google Scholar 

  12. de la Vara, J.L., et al.: Model-based specification of safety compliance needs for critical systems: a holistic generic metamodel. Inf. Softw. Technol. 72, 16–30 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

The work presented in this paper was created in context of the DEIS Project funded by the European Commission (Grant No. 732242).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Reich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Reich, J., Zeller, M., Schneider, D. (2019). Automated Evidence Analysis of Safety Arguments Using Digital Dependability Identities. In: Romanovsky, A., Troubitsyna, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2019. Lecture Notes in Computer Science(), vol 11698. Springer, Cham. https://doi.org/10.1007/978-3-030-26601-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26601-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26600-4

  • Online ISBN: 978-3-030-26601-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics