Skip to main content

Comparative Conformance Cases for Monitoring Multiple Implementations of Critical Requirements

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2013)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8153))

Included in the following conference series:

  • 2377 Accesses

Abstract

The paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance cases, explain the software services used to implement them and present a case study of monitoring the implementation of the EC Regulation No. 994/2010, related to risk management of gas supply infrastructures across Europe.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Study on Risk Governance of European Critical Infrastructures in the ICT and Energy Sector, Final Report, AEA Technology, ED05761 (2009)

    Google Scholar 

  2. Górski, J.: Trust Case – a case for trustworthiness of IT infrastructures. In: Cyberspace Security and Defense. NATO Science Series, vol. 196, pp. 125–142. Springer (2005)

    Google Scholar 

  3. Górski, J., Jarzębowicz, A., Leszczyna, R., Miler, J., Olszewski, M.: Trust case: justifying trust in IT solution. Reliability Engineering and System Safety 89(1), 33–47 (2005)

    Article  Google Scholar 

  4. Ministry of Defence, Defence Standard 00-56 Issue 4: Safety Management Requirements for Defence Systems (2007)

    Google Scholar 

  5. Yuan, T., Kelly, T.: Argument based approach to computer safety system engineering. Int. J. Critical Computer-Based Systems 3(3), 151–167 (2012)

    Article  Google Scholar 

  6. Palin, R., Habli, I.: Assurance of automotive safety – A safety case approach. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 82–96. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. ISO/IEC 15026-2:2011: Systems and software engineering - Systems and software assurance - Part 2: Assurance case (2011)

    Google Scholar 

  8. Górski, J.: Trust-IT – a framework for trust cases, Workshop on Assurance Cases for Security - The Metrics Challenge. In: Proc. of DSN 2007, Edinburgh, UK, pp. 204–209 (2007)

    Google Scholar 

  9. Cyra, Ł., Górski, J.: Supporting Compliance with Safety Standards by Trust Case Templates. In: Proc. ESREL 2007, Stavanger, Norway, pp. 1367–1374 (2007)

    Google Scholar 

  10. Toulmin, S.: The Uses of Argument. Cambridge University Press (1958)

    Google Scholar 

  11. Goal Structuring Notation community Standard version 1 (2011)

    Google Scholar 

  12. Adelard Safety Case Editor (ASCE) website, http://www.adelard.com/asce/

  13. Shafer G.: Mathematical Theory of Evidence. Princetown University Press (1976)

    Google Scholar 

  14. Cyra, Ł., Górski, J.: Support for argument structures review and assessment. Reliability Engineering and System Safety 96, 26–37 (2011)

    Article  Google Scholar 

  15. Górski, J., Jarzębowicz, A., Miler, J., Witkowicz, M., Czyżnikiewicz, J., Jar, P.: Supporting Assurance by Evidence-Based Argument Services. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP Workshops 2012. LNCS, vol. 7613, pp. 417–426. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  16. Proceedings of the Workshop on Selected Problems in Environmental Risk Management and Emerging Threats, Gdansk, Poland (June 2009), http://kio.pg.gda.pl/ERM2009/

  17. Górski, J., Jarzębowicz, A., Miler, J.: Validation of services supporting healthcare standards conformance. Metrology and Measurements Systems XIX(2), 269–282 (2012)

    Google Scholar 

  18. Regulation (EU) No 994/2010 of the European Parliament and of the Council of 20 October 2010 concerning measures to safeguard security of gas supply and repealing Council Directive 2004/67/EC (2010)

    Google Scholar 

  19. European Institute of Public Administration, CAF-Common Assessment Framework (2012), http://www.eipa.eu/en/topic/show/&tid=191

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Górski, J., Jarzębowicz, A., Miler, J. (2013). Comparative Conformance Cases for Monitoring Multiple Implementations of Critical Requirements. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2013. Lecture Notes in Computer Science, vol 8153. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40793-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40793-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40792-5

  • Online ISBN: 978-3-642-40793-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics