Skip to main content

Towards Agile Engineering of High-Integrity Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5219))

Abstract

We describe the results of a pilot study on the application of an agile process to building a high-integrity software system. The challenges in applying an agile process in this domain are outlined, and potential solutions for dealing with issues of communication, scalability, and system complexity are proposed. We report on the safety process, argumentation generated to support the process, and the technology and tools used to strengthen the agile process in terms of support for verification and validation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrahamsson, P., Wasta, J., Siponen, M.T., Ronkainein, J.: New directions on Agile Methods. In: Dillon, L., Tichy, W. (eds.) Proc. ICSE 2003, pp. 244–254. ACM Press, New York (2003)

    Google Scholar 

  2. Amey, P., Chapman, R.: Static verification and Extreme Programming. In: Sward, R. (ed.) Proc. SigADA 2004, pp. 4–9 (2004)

    Google Scholar 

  3. Beck, K.: Extreme Programming explained. Addison-Wesley, Reading (2000)

    Google Scholar 

  4. Beznosov, K., Kruchten, P.: Towards agile security assurance. In: Sekar, R., McHugh, J. (eds.) Proc. 2004 Workshop on New security paradigms, pp. 47–54 (2004)

    Google Scholar 

  5. Boehm, B.: Get Ready for Agile Methods, with Care. IEEE Computer 35, 64–69 (2002)

    Google Scholar 

  6. Boehm, B., Turner, R.: Balancing agility and discipline. Pearson, London (2003)

    Google Scholar 

  7. Boström, G., Wäyrynen, J., Bodén, M., Beznosov, K., Kruchten, P.: Extending XP practices to support security requirements engineering. In: Bruschi, D., De Win, B. (eds.) Proc. Workshop on Software engineering for secure systems, ICSE 2006, pp.11–18. ACM Press, New York (2006)

    Chapter  Google Scholar 

  8. Eckstein, J.: Agile Software Development in the Large. Dorset House (2004)

    Google Scholar 

  9. Galloway, A., Paige, R.F.: On the use of Agile Methods for High-Integrity Real-Time Systems, DARP Technical Report DARP-TR-2006-5 (2006)

    Google Scholar 

  10. Grenning, J., Peeters, J., Behring, C.: Agile development for embedded software. In: Zannier, C., Erdogmus, H., Lindstrom, L. (eds.) XP/Agile Universe 2004. LNCS, vol. 3134, pp. 194–195. Springer, Heidelberg (2004)

    Google Scholar 

  11. Habli, I., Kelly, T.: Process and product certification arguments. ACM SIGBED Review 3(4), 1–8 (2006)

    Article  Google Scholar 

  12. Kaiser, B., Liggesmeyer, P., Mäckel, O.: A new component concept for fault trees. In: Cant, T. (ed.) Proc. 8th Australian Workshop on Safety critical systems and software, pp. 37–46. Australian Computer Society (2003)

    Google Scholar 

  13. Kelly, T.P.: Arguing safety – A systematic approach to managing safety cases (PhD thesis), University of York (1998)

    Google Scholar 

  14. Manhart, P., Schneider, K.: Breaking the ice for Agile Development of Embedded software: an industry experience report. In: Estublier, J., Rosenblum, D. (eds.) Proc. ICSE 2004, pp. 378–386. ACM Press, New York (2004)

    Google Scholar 

  15. Manifesto for Agile Software Development (2007), http://agilemanifesto.org/

  16. Paige, R.F., Chivers, H., McDermid, J.A., Stephenson, Z.R.: High-Integrity Extreme Programming. In: Omicini, A. (ed.) Proc. SAC 2005, pp. 1518–1523. ACM Press, New York (2005)

    Chapter  Google Scholar 

  17. Pumfrey, D.J.: The principled design of computer system safety analyses (PhD thesis), University of York (1999)

    Google Scholar 

  18. Robertson, S., Robertson, J.: Mastering the requirements process, AWL (2006)

    Google Scholar 

  19. Theunissen, W.H.M., Kourie, D.G., Watson, B.W.: Standards and agile software development. In: Eloff, J., et al. (eds.) Proc. Enablement through technology, vol. 47, pp. 178–188 (2003)

    Google Scholar 

  20. Wikipedia contributors, OODA Loop, Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/w/index.php?title=OODA_Loop&oldid=154056152

  21. Wils, A., Van Baelen, S.: Towards an Agile avionics process (2007), http://www.agile-itea.org/public/deliverables/ITEA-AGILE-D2.12_v1.0.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Paige, R.F., Charalambous, R., Ge, X., Brooke, P.J. (2008). Towards Agile Engineering of High-Integrity Systems. In: Harrison, M.D., Sujan, MA. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2008. Lecture Notes in Computer Science, vol 5219. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87698-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87698-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87697-7

  • Online ISBN: 978-3-540-87698-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics