scispace - formally typeset
Open AccessProceedings ArticleDOI

Model-based safety assessment: Review of the discipline and its challenges

Reads0
Chats0
TLDR
This paper presents a simple classification schema for MBSA techniques based on two criteria — provenance of the model and engineering semantics of component dependencies captured by the model.
Abstract
Since its emergence in 1990s, Model-Based Safety Assessment (MBSA) has enjoyed significant interest from both academia and industry. The last decade has seen not only the development of a number of methods, techniques and tools, but also the gradual adoption of MBSA techniques by industry and its acceptance by regulators. However, the field of MBSA encompasses a large number of fundamentally dissimilar techniques. This paper presents a simple classification schema for MBSA techniques based on two criteria — provenance of the model and engineering semantics of component dependencies captured by the model. The classification organizes the existing techniques into a number of coherent families. Applicability, limitations and challenges of most prominent families of MBSA techniques are presented, and some of the common challenges faced by MBSA discipline are discussed.

read more

Content maybe subject to copyright    Report

Model-Based Safety Assessment
Review of the Discipline and its Challenges
Oleg Lisagor, Tim Kelly
Department of Computer Science
The University of York
United Kingdom
{oleg.lisagor, tim.kelly}@cs.york.ac.uk
Ru Niu
State Key Laboratory of Rail Traffic Control & Safety
Beijing Jiaotong University
Beijing, China
rniu@bjtu.edu.cn
Abstract Since its emergence in 1990s, Model-Based Safety
Assessment (MBSA) has enjoyed significant interest from both
academia and industry. The last decade has seen not only the
development of a number of methods, techniques and tools, but
also the gradual adoption of MBSA techniques by industry and
its acceptance by regulators. However, the field of MBSA
encompasses a large number of fundamentally dissimilar
techniques. This paper presents a simple classification schema for
MBSA techniques based on two criteria provenance of the
model and engineering semantics of component dependencies
captured by the model. The classification organizes the existing
techniques into a number of coherent families. Applicability,
limitations and challenges of most prominent families of MBSA
techniques are presented, and some of the common challenges
faced by MBSA discipline are discussed.
Keywords- System Safety Engineering, Safety Assessment
Methodology, Model-Based Safety Assessment.
I. INTRODUCTION
Since its emergence in 1990s, Model-Based Safety
Assessment (MBSA) has enjoyed significant interest from both
academia and industry. In the last decade MBSA methods have
been gradually adopted by the industry and increasingly
accepted by the Regulators (especially in the aviation sector).
For example, Flight Control System of Dassault 7x aircraft has
been certified on the basis of models specified in a dataflow
dialect of AltaRica Language [2]; the forthcoming revision of
ARP4761 (“Guidelines and Methods for Conducting the Safety
Assessment Process on Civil Airborne Systems and
Equipment”) document a de-facto safety engineering
standard of the aviation industry is likely to include explicit
provisions for the use of MBSA.
Original MBSA techniques, such as Failure Propagation
and Transformation Notation (FPTN) [14], Hierarchically
Performed Hazard Origin and Propagation Studies (HiP-
HOPS) [23] and AltaRica language [3] have sought to unify
‘classical’ safety analysis methods such as Fault Tree Analysis
(FTA) and Failure Modes and Effects Analysis (FMEA) and to
provide a formalism for capturing a single authoritative ‘safety
model’ of the system. Classical analysis artifacts (fault trees,
minimal cut sets or FMEA tables) could be automatically
extracted from such a core model for any condition of interest
(such as a system-level failure condition).
In addition to the unification and at least partial automation
objectives above, virtually all MBSA techniques seek tighter
integration between safety assessment and design artifacts
(models). However the exact approach to such integration
ranges from improving traceability by introducing the notion of
components to performing safety analysis on the basis of
design models themselves.
Finally, many MBSA methods have declared objectives of
compositional and reusable safety assessment. Some have also
sought to expand on the combinatorial nature of the FTA and
to provide expressive power that is seen as more suitable for
complex and highly-reconfigurable safety critical systems.
Many of the MBSA methods share little technical
characteristics apart from the abstract objectives above. The
nature of the information captured in the safety assessment
models and the process of their construction differs
significantly. Challenges posed by different families of
techniques often remain hidden and unaddressed under the
umbrella term of “model-based safety assessment”. For
example, we have shown previously that for some MBSA
methods compositionality and reusability objectives are
fundamentally unattainable and argued that for others the
achievement comes at a cost of reducing the scope of the
assessment and/or introduction of a “common point of failure”
between design and safety assessment processes. [19].
In the remainder of this paper we organize MBSA methods
into coherent and internally consistent families that share key
technical features, strengths, limitations and challenges. We
use two criteria for such classification model provenance and
engineering semantics of component interfaces described in
sections 2 and 3 respectively. Section 4 presents classification
of some of the MBSA techniques according the two criteria
and Section 5 discusses the applicability and future challenges
of different families of methods. We conclude with the
summary and some remarks on challenges faced by the MBSA
research discipline as a whole.
II. MODEL PROVENANCE
The first criteria that distinguishes MBSA methods is
concerned with the process of definition of the safety models
and its relationship with the system design process. There are
currently two approaches to model construction:
Supported by the Key State Laboratory for Rail Traffic Control and
Safety (contract number RCS2010K003), Beijing Jiaotong University and by
the European Commission MISSA project (contract number ACP7-GA-2008-
212088)

a) Safety assessment models can be defined through
extension of the models used in the system
development process,
b) Safety assessment can be performed on the basis of
dedicated models defined by safety engineers and
obtained through ‘manual’ assessment of the system.
An example of the first approach is Extended System
Model (ESM) / Failure Injection (FI) methods developed by
ESACS and ISAAC project over the past 10 years [2, 9].
Under this approach safety engineers receive design models of
the system, specified in languages such as SCADE or Matlab
Simulink, from the development process. The model is then
extended with Failure Mode (FM) models simple model
components ‘injected’ into the flows of original model. Each
FM component (Fig.1) typically has two inputs and an output.
One of the inputs and the output are used to insert the FM into
a flow; their types are therefore the same as the type of that of
the original flow. The remaining input is Boolean as is called
‘activation’ of the FM. The component itself defines the effect
of the Failure Mode such as value being stuck at zero or an
inversion of a Boolean value. When activation input is set to
true this deviation is applied to the flow, whereas inactive FM
components simply propagate original inputs to outputs, thus,
having no effect on the behavior (Fig. 1).
ESACS and ISAAC projects have developed a
comprehensive library of failure modes and adapted modeling
tools such as SCADE to provide graphical user interface to
support the model extension process and definition of bespoke
failure modes. The platform also ‘hides’ implementation of the
failure modes (i.e. FM components) from the user, thus,
avoiding excessive cluttering of the model and ensuring that,
even when extended, the model can still be used in the
development process. Finally, tools were also developed tools
to enable analysis of the extended system models with respect
to a system-level failure conditions specified over model
variables. Whilst often based on model checking technology,
the analysis performed by these tools is logically equivalent to
an exhaustive search through activation of all possible
permutations of failure modes. Permutations that lead to the
satisfaction of the failure condition expression are reported as
Minimal Cut Sets (MCSs).
The key advantage of the model extension approach is
consistency, by construction, of the safety analyses and the
‘real’ design model of the system. Furthermore, development
and safety processes are capable of sharing a common
modeling environment, languages and tools.
However, such unquestioned’ utilization of the design
model may introduce new risks into the safety assessment
process. As any models, system design models are
“abstractions defined with an intended goal in mind” [30];
however, safety assessment is clearly not an intended goal
when design models are defined. Consequently, the use of
these models may impose undue constraints on the safety
assessment leading to incomplete analysis results with respect
to the real-world behavior of the system. For example, failure
of components may not only lead to the deviations of outputs,
but may also result in new, unintentional, interactions between
the components and, even possibly establish the unintended
dependencies paths between apparently unconnected
components. Short circuits of electrical power distribution
systems are an example of such behavior. Failure injection
approach is typically incapable of adequately uncovering these
scenarios.
Figure 1 - Two Simple Failure Mode Components in Matlab Simulink
Furthermore, assuming adequacy of the design models,
injection of an incomplete set of failure modes into the model
will potentially lead to incomplete safety analysis.
Completeness of the injection, however, is notoriously difficult
to guarantee since each failure mode must be defined in detail
and concrete terms. A “signal is provided with the delay
failure mode, that can be often found in classical safety
analyses, for example, would have to be modeled differently at
least for constant delay (offset) and for every variable delay
profile (e.g. continuously increasing, continuously decreasing,
wave-form).
Finally, the approach does not permit model abstraction
from the level of detail set by system developers. This means
that the computational complexity of complete extended
system models of modern systems is often intractable with
current analysis tools.
The second approach to MBSA, based on dedicated ‘stand-
alone’ safety assessment models, alleviates many of the above
problems. As models are created specifically for the goal of
safety assessment, engineers can adjust the richness of
component interfaces and the overall level of detail, thus,
avoiding unnecessary complexity whilst ensuring that the
models are adequate and fit-for-purpose. This comes at the cost
of losing the provable validity of the safety analysis results
with respect to design, and replacing consistency by
construction with some form of traceability between models in
design and safety domains. The latter is typically achieved
through the notion of component (or module) and hierarchical
organization of the safety model architecture that reflects
structure and hierarchical organization of the system (and its
design models). Most of the pioneering MBSA techniques and
notations such as HiP-HOPS [23], FPTN [13] and AltaRica
[3] follow this approach. In such models component behavior
is characterized primarily as dependency of the outputs on
components inputs and internal malfunctions. (Note: the
engineering semantics of such input and outputs is considered
in the following section.) In an attempt to provide expressive
power capable of modeling dynamic and reconfigurable
systems some of the MBSA techniques have introduced the
notion of the state into component characterizations. For
example a characterization of a shut-off hydraulic valve can be
written as following:
The valve is either closed or open and, orthogonally,
either failed or operational;

The valve may become failed as a result of an internal
malfunction (failure);
If the valve is operational and electronic control signal
is received the valve moves to an appropriate state
(closed or open); if the valve has failed then further
control signals are inconsequential;
If the valve is open its hydraulic output (which models
provision of hydraulic pressure) takes the value of the
hydraulic input; otherwise the output is false (no
pressure).
Such a characterization can be trivially translated into an
AltaRica Dataflow [7, 27] node specification (Fig. 2).
node Valve
flow
Ctrl : {Open,Close} : in ;
HydIn : bool : in ;
HydOut : bool : out ;
state
FailureState : {Operational,Failed} ;
FunctionalSt : {Closed,Open} ;
event
Malfunction, Update ;
init
FailureState := Operational ;
FunctionalSt := Closed ;
trans
FailSt = Operational |- Malfunction -> FailState := Failed;
FailSt = Operational and FunctSt = Closed and Ctrl = Open
|- Update -> FunctSt := Open;
FailSt = Operational and FunctSt = Open and Ctrl = Close
|- Update -> FunctSt := Closed;
assert
(if FunctSt = Open
then HydOut = HydIn
else HydOut = false)
edon
Figure 2 - AltaRica Characterization of the Valve
Individual characterizations are then composed through
interfaces to produce an overall system model. Such models
can be analyzed to generate sets of malfunctions (i.e. Minimal
Cut Sets) for a particular unsafe system-level condition [29].
Alternatively, if the modeling language is restricted to
combinatorial logic, models can be trivially parsed to
synthesize results in a fault tree format [23, 24].
In essence, this approach to MBSA can be seen as
modularization and, optionally, expansion of the expressive
power of the fault trees. Kaiser’s State/Event Fault Trees
technique [16, 17] highlights this perspective most clearly.
Overall, the approach ensures consistency between various
safety analyses of the system as these are based on a single
‘central’ model. However, it does not guarantee consistency
with the design models and safety engineers maintain
responsibility for the adequacy of MBSA results. Furthermore,
although the system assessment process (that is clearly at the
core of the model elicitation under this approach to MBSA) is
critical to the confidence in the model and, by extension,
analysis adequacy, there is little repeatable guidance on how
such assessment can be conducted and how safety models can
be constructed in a systematic and repeatable fashion.
Finally, it is important to note that a number of hybrid
techniques have been proposed. These utilize the architecture
of the design model whilst tasking safety engineers with
characterizing behavior of individual components for the
purpose of the safety assessment. Examples of such techniques
are the integration of HiP-HOPS with Matlab Simulink
proposed by Papadopoulos and Maruhn [25] and the Error
Modelling Annex of the Architecture Analysis and Design
Language (AADL) [12, 31]. Whilst such techniques strengthen
the traceability between development and safety processes and
partially automate model construction, they exhibit some
vulnerabilities of both extended and dedicated safety model
approaches. In particular models produced under hybrid
techniques typically limit safety assessment to considering only
intentional interactions between components (as in ESM
approach). Similarly, such models are not provably correct
with respect to the design (as under the dedicated safety model
approach).
III. ENGINEERING SEMANTICS OF COMPONENT INTERFACES
The process of model construction, discussed in the
previous section, is not the only important difference between
various MBSA techniques. Regardless of how the models are
produced, it is clearly important to ask such question as: What
do they represent? What safety engineering concepts are
captured by the theoretical constructs? It is therefore important
to establish the safety engineering semantics of these models.
System safety and reliability can be conceptualized in
different terminology and from different viewpoints. Different
standards, regulators and academic researchers promote
different ontologies of key safety engineering terms and
concepts [34]. Whilst some, such as that by Avizienis, Laprie
and Randell [4], are more prominent than others, no set of
safety engineering terms is universally accepted and, more
importantly, no single ontology is appropriate for use in all
contexts.
MBSA is no exception. The difference between the
conceptual viewpoints adopted by MBSA techniques is most
revealing on components interfaces. The original MBSA
methods, such as HiP-HOPS and FPTN, have modeled
dependencies between the components in terms of deviations
of their behavior from design intent. In the terminology of
these techniques, such models capture dependencies of
components on failure modes exhibited by other components of
the system. Failure modes are typically defined through
abstract categories (such as omission, commission, early, late
or value deviations) and represented in the models as either
individual Boolean flows or symbols of an enumerated type.
Assuming that a dedicated safety model is being created, we
call this general MBSA approach Failure Logic Modeling
(FLM).
To briefly illustrate, a failure logic specification of a shut-
off valve mentioned in the previous section would typically
state that omission of hydraulic output could be caused by
omission of hydraulic input or omission of the control input or
an internal malfunction (failure) of the valve itself. Assuming
that the valve is loaded to closed position and that its hydraulic
input is intended to be constantly pressurized (e.g. the valve is

connected directly to a pump), commission of the output could
be caused by either commission of the control input or an
internal failure.
On the other side of the semantics spectrum, lie approaches
where component dependencies are captured in terms of
abstracted flows of information, matter or energy and “real”
physical or logical characteristics of such flows (e.g. pressure,
volume, voltage, electrical current, items of data, etc.). Such
flows are sometimes referred to as “nominal flows”. If
dedicated safety models are created, mathematically
component outputs are still a function of component inputs and
any internal malfunction (or, optionally, the state of the
component). The example of the valve provided in the previous
section follows this approach. We call this approach Failure
Effects Modeling (FEM). Other examples can be found in
some AltaRica models [6] as well as techniques proposed
elsewhere (e.g. [22]).
FEMs can be captured using the same languages as FLMs.
What distinguishes the two approaches is the model semantics
and the engineering viewpoint adopted in their elicitation. This
distinction, however, has serious consequences in terms of the
qualities of the models and the overall safety assessment
model. In particular, FLM components are characterized with
respect to an implicit design intent. Such component models
are generally not reusable as the intent of the physically
identical components depends on their system context [19]. For
example, consider again the shut off valve. Assume further that
two identical valves are connected in series and controlled by
an identical signal. The hydraulic input of upstream valve is
connected to a pump (i.e. it is intended to be always
pressurized); the output of the downstream valve is connected
to the actuator assembly. Consider the commission failure
mode of the valve (i.e. provision of pressure when pressure is
unintended). The characterization of the upstream valve is as
previously presented, i.e. commission can be result of the
commission of control input or internal failure. For the
downstream valve, however, this propagation condition is too
pessimistic in addition to either control commission or
internal failure this valve must be exposed to a commission of
the hydraulic input in order to exhibit this failure mode on the
output. Thus, whilst valves are physically identical, their failure
logic characterizations are different and, thus, not easily
reusable.
Furthermore, we have previously demonstrated that FLMs
of complex reconfigurable systems are not compositional [19]
the model must contain more information than is contained in
all of its components and characterization of individual
components must refer to modes of operation (that, similarly to
global variables, can only be captured at higher levels of
decomposition). The resultant FLMs are complex both in terms
of the construction process and computational complexity of
model analyses.
In contrast, FEMs are mostly compositional and reusable.
Construction of such models is often more intuitive to
engineers and their analysis is less complex. However, in their
pure form and similarly to the FI/ESM approach described in
the previous section, FEMs are limited to intentional
interactions over intended path. To overcome this limitation
some researchers have adapted hybrid modeling techniques [5,
18] whereby intentional interactions are modeled using a FEM
approach whilst unintentional interactions such as short
circuits of electrical systems or leaks in hydro-mechanical
systems are characterized as Failure Modes dependencies and
utilize the FLM approach.
Despite apparent benefits of such hybrid approach, we have
discovered that the process of FLM construction requires a
higher level of intellectual engagement by safety engineers and
more thorough review of the system design than construction
of FEMs or Hybrid Models. During the FLM construction
system design proposal is reviewed from a perspective
fundamentally dissimilar to that of the development process.
Consequently, important limitations of the system architecture
are often identified as a direct result of such review and before
the model is even completed and analyzed. In contrast, safety
assessment based on FEMs or hybrid models adopts a similar
perspective to the development process and cannot fully satisfy
the objective of having conducted an analytically diverse
review of the design.
IV. CLASSIFICATION OF TECHNIQUES
Table 1 shows classification of existing MBSA techniques
according to the two criteria described in the previous sections.
It is important to reiterate that the criteria are orthogonal. For
example, whilst modeling of FM propagation between
components is typically associated with construction of
dedicated models we are aware of at least one technique
Software Deviation Analysis [28] that combines FM-focused
perspective with the full utilization of the design model. Also
worth noting is a technique developed by Joshi and Heimdahl
[15] that extends the “pure Failure Injection approach by
allowing safety engineers to define new dependencies between
the components arising from unintentional interactions in
presence of failure. Such dependencies are characterized in
terms of failure mode propagation leading to an interesting
hybrid between the FI and FLM approaches.
TABLE I. CLASSIFICATION OF MBSA TECHNIQUES
Engineering Semantics of Component
Dependencies
Only Nominal
(Energy, Matter
& Information)
Flows
Both
Nominal &
FM Flows
Only FM
Flows
Model Provenance
Dedicated Safety
Model
Failure Effects
Modeling
e.g. some
AltaRica models
[6], Majdara &
Wakabayashi
technique [22]
FEM/FLM
Hybrid
Approach
e.g. some
AltaRica
Models
[5, 18]
Failure Logic
Modeling
e.g. FPTN
[13], FPTC
[37], HiP-
HOPS [23]
of Design Model
(e.g. architecture)
Hybrid
Approach
e.g.
ESACS/ISAAC
ESM approach
if underlying
system models
have to be
simplified
[10, 11]
Hybrid
Approach
e.g. Joshi &
Heimdahl
[15]
Hybrid
Approach
e.g.
HiP-HOPS
integration
with Simulink
[25]
Automated
Construction /
Utilization of
Design Model
FI/ESM
approach
[1, 8, 26]
Hybrid
Approach
e.g. Software
Deviation
Analysis [28]

Finally, it is important to note that we have intentionally
excluded the Error Modeling Annex of AADL (previously
mentioned in section 2) from the classification. In terms of
model provenance criteria the annex clearly belongs to the
middle, ‘hybrid’, row of the table since characterizations of the
components have to be manually constructed whilst the
structure, connectors and bindings of the ‘core’ AADL model
are also utilized. Classification in terms of the engineering
semantics of component dependencies is however less clear.
The Error Modeling Annex terminology and documentation
[31] suggests that that the authors intent was to support Failure
Logic Modeling. However, constructs such as Guard_Event
and Guard_Transition allow integration of the Error Modelling
Annex with the behavior of the ‘core’ model thereby enabling a
hybrid approach (that would be placed in the middle cell of
Table 1). Overall, in our view, the annex constructs can be
equally used for construction of Failure Effects Models even
though it is unlikely that this was the original intent of the
developers. Therefore we believe that the place of the AADL
in our classification depends on the usage of the language by
the safety engineers.
These observations about AADL also highlight an
important confusion in MBSA research that between
modeling language and methodology. Original MBSA
techniques (e.g. FPTN and HiP-HOPS) have been based on
their own idiosyncratic modeling languages. In this context
modeling constructs were inherently linked to safety
engineering concepts they represented. Extension or revision of
the methodology required changes to the modeling language
(and vice versa). However, usage of idiosyncratic languages,
whilst being a useful tool for research, impedes industrial
adoption of MBSA techniques: such languages are unfamiliar
to even specialist engineers, they are often not fully validated
in use and usually not supported by sufficiently mature tools.
The pragmatic approach to industrial application of MBSA is
likely to require use of third-party, commercial and
industrially-mature languages and modeling environments such
as Matlab Simulink or SCADE. Such languages can be shared
by a number of engineering disciplines making continuous
improvement of modeling environments economically feasible
as well as facilitating more thorough review and validation of
the language and software by a larger community of
professional engineers and researchers.
V. APPLICABILITY & CHALLENGES OF MBSA TECHNIQUES
Different MBSA approaches presented in this paper do not
necessarily conflict and, instead, are often applicable at
different stages of the safety lifecycle. Whilst different models
of safety lifecycles exist in different domains and regulatory
jurisdictions these are based on similar concepts. For example
in aviation domain ARP4754 and 4761 documents [32, 33]
define the following three primary stages of the safety process:
Functional Hazard Assessment (FHA): a hazard
identification stage described by the standard as “a systematic,
comprehensive examination of aircraft functions to identify
and classify Failure Conditions of those functions according to
their severity” [32]. FHA is conducted at both aircraft and
system levels.
Preliminary System Safety Assessment (PSSA): “a
systematic evaluation of a proposed system architecture and its
implementation, based on the Functional Hazard Assessment
and failure condition classification, to determine safety
requirements for all items in the architecture [32]. PSSA is
intended to be a design-driving and, thus, iterative process that
starts at the earliest stages of system design.
System Safety Assessment (SSA): “a systematic,
comprehensive evaluation of the implemented system to show
that the relevant safety requirements are met” [32]. Unlike
PSSA, SSA is performed on the finished design feeding into a
V&V rather than design function. In other words, it lies on the
right hand side of the standard “V Model” of the development
process.
These three stages are supported by a Common Cause
Analysis (CCA). Furthermore, the recently published revision
of the standard ARP4754a also defines Preliminary Aircraft
System Safety Assessment (PASA) that can be broadly seen as
multi-system PSSA. However, FHA, CCA and PASA lie
outside the scope of this paper and we focus our discussion
exclusively on PSSA and SSA.
Similarly, we constrain our discussion to the most
prominent families of MBSA techniques ESM/FI, FLM and
FEM/FLM Hybrid. Although historically used in industry, the
“pure” FEM approach, in our view, is too constrained and
provides no advantages over the FEM/FLM hybrid. The
maturity of other MBSA techniques (except for those
considered below) does not yet permit discussion about their
applicability.
A. FLM and Hybrid Techniques
In our view both FLM and the hybrid approach can support
exploratory safety assessment of system architecture (e.g.
fulfilling the objectives of the PSSA). Both approaches can be
applied early in the development process and in the context of
iterative and incremental safety assessment [20]. However, the
significant additional effort of constructing FLMs is not
necessarily justified for every system in the context of product
lines with a relatively stable architecture (such as an aircraft
family). In such contexts it may be sufficient to use a less time
consuming hybrid approach.
In contrast, when a proposed system design is based on a
significantly new architecture (such as a typical design of
systems for a new family of aircraft or design of a new
railways control concept) the significantly higher effort
necessary for constructing FLMs may be justified by the value
added by a thorough review of the architecture under this
approach. This scenario, of course, includes establishing of a
new product line.
However, both approaches rely on construction of the new
safety model that captures the safety engineers’ hypotheses
about behavior of the system. The adequacy of these models
would determine the adequacy of the model-based PSSA just
as the adequacy of fault trees today determines the adequacy of
the ‘classical’ PSSA. We have previously demonstrated that
construction of adequate safety models relies on existence of
systematic and repeatable modeling methods and
comprehensive guidance [21]. Whilst we have developed such
guidance for the FLM approach and performed partial
evaluation, further independent evaluation is necessary in order
to establish whether our “FLM Handbook provides sufficient
support to the construction of FLM models comparable with
the support Fault Tree Analysis Handbook [35, 36] provides
for construction of fault trees.
Furthermore, we have argued that whilst usage of modeling
languages with well-defined semantics contributes to
confidence in model adequacy it is not sufficient for such
confidence. We are advocating implementation of the FLM and

Citations
More filters
Journal ArticleDOI

An overview of fault tree analysis and its application in model based dependability analysis

TL;DR: The standard fault tree with its limitations is reviewed and a number of prominent MBDA techniques where fault trees are used as a means for system dependability analysis are reviewed and an insight into their working mechanism, applicability, strengths and challenges are provided.
Book ChapterDOI

Model-based dependability analysis: State-of-the-art, challenges, and future outlook

TL;DR: This chapter reviews a number of prominent techniques under model-based dependability analysis, and provides an insight into their working mechanism, applicability, strengths, and challenges, as well as recent developments within these fields.
Journal ArticleDOI

RFlySim: Automatic test platform for UAV autopilot systems with FPGA-based hardware-in-the-loop simulations

TL;DR: An indoor automatic test platform for autopilot systems aiming to significantly improve the development efficiency and safety level of UAVs is presented and an automatic test framework is proposed to traverse test cases during real-time flight simulation and assess the test results.
Journal ArticleDOI

Safety Is an Emergent Property: Illustrating Functional Resonance in Air Traffic Management with Formal Verification

TL;DR: In this article, a formal verification tool called SPIN is proposed to identify hazards caused by functional resonance in a developing Air Traffic Management (ATM) system where the Minimum Safe Altitude Warning (MSAW) is introduced, i.e., MSAW-in-ATM system.
Journal ArticleDOI

Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions Over the Internet

TL;DR: This work proposes a methodology for the safety assurance of drones over the Internet using Bayesian networks for probabilistic modeling and uses the international safety standards, namely, ISO 12100 and ISO 13849 to assess the safety of drone's missions by focusing on qualitative assessment techniques.
References
More filters
Journal ArticleDOI

Basic concepts and taxonomy of dependable and secure computing

TL;DR: The aim is to explicate a set of general concepts, of relevance across a wide range of situations and, therefore, helping communication and cooperation among a number of scientific and technical communities, including ones that are concentrating on particular types of system, of system failures, or of causes of systems failures.

Basic Concepts and Taxonomy of Dependable and Secure Computing

TL;DR: In this paper, the main definitions relating to dependability, a generic concept including a special case of such attributes as reliability, availability, safety, integrity, maintainability, etc.
Journal ArticleDOI

The pragmatics of model-driven development

Bran Selic
- 01 Sep 2003 - 
TL;DR: The key lies in resolving pragmatic issues related to the artifacts and culture of the previous generation of software technologies that have rarely produced anticipated benefits.
Book

Fault Tree Handbook

TL;DR: This handbook has been developed not only to serve as text for the System Safety and Reliability Course, but also to make available to others a set of otherwise undocumented material on fault tree construction and evaluation.

b'Fault Tree Handbook'

TL;DR: In this paper, the authors present a short course entitled "System Safety and Reliability Analysis" which has been presented to over 200 National Research Council (NRC) personnel and contractors.