Skip to main content

Modeling, Analysis and Testing of Safety Issues - An Event-Based Approach and Case Study

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4680))

Abstract

This paper proposes an event-based approach with an intuitive simple graphical representation of the system and its environment for designing, analysis and testing safety-critical systems. The events are user actions and system responses, and are ordered according to the threats posed by the resulting system states. This ordering is an integral aspect of the graphical representation, making it possible to directly identify the risks associated with each and every functionally desirable, and undesirable, event relative to one another. Tests that target safety requirements are devised by examining possible traces of these events, represented compactly by regular expressions, exhibiting particular risk patterns such as human error and system failures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Belli, F., Grosspietsch, K.-E.: Specification of Fault-Tolerant System Issues by Predicate/Transition Nets and Regular Expressions – Approach and Case Study. IEEE Trans. On Softw. Eng. 17/6, 513–526 (1991)

    Article  Google Scholar 

  2. Belli, F.: Finite-State Testing and Analysis of Graphical User Interfaces. In: Proc. 12th Internat’l. Symp. Software Reliability Engineering, pp. 34–43 (2001)

    Google Scholar 

  3. Bochmann, G.V., Petrenko, A.: Protocol Testing: Review of Methods and Relevance for Software Testing. Softw. Eng. Notes, ACM SIGSOFT, 109–124 (1994)

    Google Scholar 

  4. Chow, T.S.: Testing Software Designed Modeled by Finite-State Machines. IEEE Trans. Softw. Eng. 4, 178–187 (1978)

    Article  Google Scholar 

  5. Eggers, B., Belli, F.: A Theory on Analysis and Construction of Fault-Tolerant Systems (in German). In: Informatik-Fachberichte 84, pp. 139–149. Springer, Berlin (1984)

    Google Scholar 

  6. Harel, D., Namaad, A.: The STATEMATE Semantics of Statecharts. ACM Trans. Softw. Eng. Meth. 5, 293–333 (1996)

    Article  Google Scholar 

  7. Leveson, N.G.: Safeware, System Safety and Computers. Addison-Wesley, Reading (1995)

    Google Scholar 

  8. Memon, A.M., Pollack, M.E., Soffa, M.L.: Automated Test Oracles for GUIs. In: SIGSOFT 2000, pp. 30–39 (2000)

    Google Scholar 

  9. Nissanke, N., Dammag, H.: Design for Safety in Safecharts With Risk Ordering of States. Safety Science 40, 753–763 (2002)

    Article  Google Scholar 

  10. Offutt, J., Shaoying, L., Abdurazik, A., Ammann, P.: Generating Test Data From State-Based Specifications. The Journal of STVR 13(1), 25–53 (2003)

    Google Scholar 

  11. Salomaa, A.: Theory of Automata. Pergamon Press, Oxford (1969)

    MATH  Google Scholar 

  12. Storey, N.: Safety-critical computer systems. Addison-Wesley, Reading (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Francesca Saglietti Norbert Oster

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Belli, F., Hollmann, A., Nissanke, N. (2007). Modeling, Analysis and Testing of Safety Issues - An Event-Based Approach and Case Study. In: Saglietti, F., Oster, N. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2007. Lecture Notes in Computer Science, vol 4680. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75101-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75101-4_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75100-7

  • Online ISBN: 978-3-540-75101-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics