Skip to main content

Compositional Hazard Analysis of UML Component and Deployment Models

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3219))

Included in the following conference series:

Abstract

The general trend towards complex technical systems with embedded software results in an increasing demand for dependable high quality software. The UML as an advanced object-oriented technology provides in principle the essential concepts which are required to handle the increasing complexity of these safety-critical software systems. However, the current and forthcoming UML versions do not directly apply to the outlined problem. Available hazard analysis techniques on the other hand do not provide the required degree of integration with software design notations. To narrow the gap between safety-critical system development and UML techniques, the presented approach supports the compositional hazard analysis of UML models described by restricted component and deployment diagrams. The approach permits to systematically identify which hazards and failures are most serious, which components or set of components require a more detailed safety analysis, and which restrictions to the failure propagation are assumed in the UML design.

This work was developed in the course of the Special Research Initiative 614 – Self-optimizing Concepts and Structures in Mechanical Engineering – University of Paderborn, and was published on its behalf and funded by the Deutsche Forschungsgemeinschaft.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McDermid, J.A.: Trends in Systems Safety: A European View? In: Lindsay, P. (ed.) Seventh Australian Workshop on Industrial Experience with Safety Critical Systems and Software, Adelaide, Australia. Conferences in Research and Practice in Information Technology, vol. 15, pp. 3–8. ACS (2003)

    Google Scholar 

  2. McDermid, J., Pumfrey, D.: Software Safety: Why is there no Consensus? In: Proceedings of the 19th International System Safety Conference, Huntsville, AL, USA, pp. 17–25 (2001)

    Google Scholar 

  3. Fenelon, P., McDermid, J.A., Nicolson, M., Pumfrey, D.J.: Towards integrated safety analysis and design. ACM SIGAPP Applied Computing Review 2, 21–32 (1994)

    Article  Google Scholar 

  4. Papadopoulos, Y., McDermid, J.R., Sasse, B., Heiner, G.: Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Reliability Engineering & System Safety 71, 229–247 (2001)

    Article  Google Scholar 

  5. Kaiser, B., Liggesmeyer, P., Maeckel, O.: A New Component Concept for Fault Trees. In: Proceedings of the 8th National Workshop on Safety Critical Systems and Software (SCS 2003), Canberra, Australia, October 9-10. Research and Practice in Information Technology, vol. 33 (2003)

    Google Scholar 

  6. Grunske, L., Neumann, R.: Quality Improvement by Integrating Non-Functional Properties in Software Architecture Specification. In: Proc. of the SecondWorkshop on Evaluating and Architecting System dependability (EASY), San Jose, California, USA (2002)

    Google Scholar 

  7. Grunske, L.: Annotation of Component Specifications with Modular Analysis Models for Safety Properties. In: Overhage, S., Turowski, K. (eds.) Proc. of the 1st Int. Workshop on Component Engineering Methodology, Erfurt, Germany (2003)

    Google Scholar 

  8. Object Management Group: UML2.0 Superstructure Specification, Document ptc/03-08-02 (2003)

    Google Scholar 

  9. Szyperski, C.: Component Software, Beyond Object-Oriented Programming. Addison-Wesley, Reading (1998)

    Google Scholar 

  10. McDermid, J., Pumfrey, D.: A Development of Hazard Analysis to aid Software Design. In: Proceedings of the Ninth Annual Conference on Computer Assurance (COMPASS 1994), Gaithersburg, MD, USA, pp. 17–25 (1994)

    Google Scholar 

  11. Ogata, K.: Modern control engineering. Prentice-Hall, Englewood Cliffs (1990)

    MATH  Google Scholar 

  12. Selic, B., Gullekson, G., Ward, P.: Real-Time Object-Oriented Modeling. John Wiley and Sons Inc., Chichester (1994)

    MATH  Google Scholar 

  13. Birolini, A.: Reliability engineering: theory and practice, 3rd edn. Springer, Berlin (1999)

    MATH  Google Scholar 

  14. Laprie, J.C. (ed.): Dependability: basic concepts and terminology in English, French, German, Italian and Japanese [IFIP WG10.4, Dependable Computing and Fault Tolerance]. Dependable computing and fault tolerant systems, vol. 5. Springer, Wien (1992)

    Google Scholar 

  15. Rauzy, A.: A new methodology to handle Boolean models with loops. IEEE Transactions on Reliability 52, 96–105 (2003)

    Article  Google Scholar 

  16. International Electrotechnical Commission Geneva. International Standard IEC 61025. Fault Tree Analysis (FTA), Switzerland (1990)

    Google Scholar 

  17. Bryant, R.E.: Symbolic Boolean manipulation with ordered binary-decision diagrams. ACM Computing Surveys 24, 293–318 (1992)

    Article  Google Scholar 

  18. Coudert, O., Madre, J.: Fault tree analysis: 1020 prime implicants and beyond. In: Proceedings of the Annual Reliability and Maintainability Symposium, Atlanta, GA, USA, pp. 240–245. IEEE Press, Los Alamitos (1993)

    Chapter  Google Scholar 

  19. Madre, J., Coudert, O., Fraisse, H., Bouissou, M.: Application of a new logically complete ATMSto digraph and network-connectivity analysis. In: Proceedings of theAnnual Reliability and Maintainability Symposium, Anaheim, CA, USA, pp. 118–123. IEEE Press, Los Alamitos (1994)

    Google Scholar 

  20. Giese, H., Burmester, S., Klein, F., Schilling, D., Tichy, M.: Multi-Agent System Design for Safety-Critical Self-Optimizing Mechatronic Systems with UML. In: Henderson-Sellers, B., Debenham, J. (eds.) OOPSLA 2003 - Second InternationalWorkshop on Agent-Oriented Methodologies,Anaheim, CA, USA, Center for Object TechnologyApplications and Research (COTAR), University of Technology, Sydney, Australia (2003)

    Google Scholar 

  21. Hawkins, R.D., McDermid, J.A.: Performing Hazard and Safety Analysis of Object Oriented Systems. In: Proceedings of the 20th System Safety Conference (ISSC 2002), Denver, USA (2002)

    Google Scholar 

  22. Giese, H., Tichy, M., Burmester, S., Schäfer, W., Flake, S.: Towards the Compositional Verification of Real-Time UML Designs. In: Proc. of the European Software Engineering Conference (ESEC), Helsinki, Finland. ACM Press, New York (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Giese, H., Tichy, M., Schilling, D. (2004). Compositional Hazard Analysis of UML Component and Deployment Models. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2004. Lecture Notes in Computer Science, vol 3219. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30138-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30138-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23176-9

  • Online ISBN: 978-3-540-30138-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics