Abstract
In this paper a novel approach for safety analysis of embedded systems is proposed, based on modelling and analysing a system in terms of constraints.
The main contributions of the reported work are: the introduction of a notation for modelling entities of the physical environment and controller, based on expressing state transition models as constraints; and providing procedures for the analysis of these models by resolution of a series of constraint satisfaction problems. In addition the work provides a systematic framework for modelling and analysis in terms of constraints, and can be realised in a constraint based programming language.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. R. Lutz. Analyzing software requirements errors in safety-critical, embedded systems. In Proceedings of the IEEE Symposium on Requirements Engineering, pages 126–133, San Diego, California, January 1993.
A. Saeed, R. de Lemos, and T. Anderson. Safety analysis of requirements specifications for safety-critical software. In ISA Transactions, volume 34, pages 283–295, 1995.
R. Lutz and R. Woodhouse. Experience report: Contributions of SFMEA to requirements analysis. ICRE, 1996.
J.A. McDermid and D. Pumfrey. A development of hazard analysis to aid software design. In Proceedings of the Ninth Annual Conference on Computer Assurance (COMPASS’ 94), pages 17–25, Gaithersburg, MD, July 1994.
N. G. Leveson, S. S. Cha, and T. J. Shimeall. Safety verification of Ada programs using software fault trees. IEEE Software, pages 48–59, July 1991.
J.M. Rushby. Formal methods and certification of critical systems. Technical Report CSL-93-7, SRI International, Menlo Park, CA., December 1993.
B. Dutere and V. Stavridou. Formal requirements of analysis of an avionics control system. IEEE Transactions on Software Engineering, SE-23(1):267–278, May 1997.
A. P. Ravn, H. Rischel, and K. M. Hansen. Specifying and verifying requirements of real-time systems. IEEE Transactions on Software Engineering, SE-19(1):41–55, January 1993.
R. de Lemos A. Saeed and T. Anderson. The role of formal methods in the requirements analysis of safety-critical systems: a train set example. In Proceedings of the 21st Symposium on Fault-Tolerant Computing, Montreal, Canada, June 1991.
M. Cepin et al. An object-based approach to modelling and analysis of failure properties. In P. Daniel, editor, 16th International conference on Safety Reliability and Security (SAFECOMP’97), pages 281–294, York, UK, September 1997. Springer-Verlag.
C.J. Garrett, S.B. Guarro, and G.E. Apostolakis. The dynamic flowgraph methodology for assessing the dependability of embedded siftware systems. IEEE Transactions on Systems, Man and Cybernetics, 25(5):824–840, May 1995.
J.D. Reese and N.G. Leveson. Software Deviation Analysis. PhD thesis, UCI, 1996.
F. C. Furteck. Constraints and Compromise, pages 189–204. Foundations of Secure Computation. Academic Press, 1978.
F. C. Furteck. Specification and verification of real-time, distributed systems using the theory of constraints. In W. Bibel and R. Kowlaski, editors, 5th Conference on Automated Deduction, pages 110–125, Les Arcs, France, July 1980. Springer-Verlag.
Y. Lebbah. Consistency checking by type inference and constraint satisfaction. In P. Daniel, editor, 16th International conference on Safety Reliability and Security (SAFECOMP’97), pages 253–264, York, UK, September 1997. Springer-Verlag.
S. Lajeunesse and A. Rauzy. Using the constraint programming system Toupie for qualitative analysis of industrial systems failures. In ESREL’97 International Conference on Safety and Reliability, pages 2021–2028, Lisbon Portugal, June 1997.
K. Kronlof, editor. Method Integration: concepts and case studies. John Wiley and Sons Ltd, 1993.
J. Gorski and B. Nowicki. Safety analysis based on object-oriented modelling of critical systems. In E. Schoitsch, editor, 15th International conference on Safety Reliability and Security (SAFECOMP’96), pages 46–60, Vienna, Austria, October 1996.
Z. Manna and A. Pnueli. Temporal Verification of Reactive Systems: Safety. Springer-Verlag, 1995.
M. Muller et al. DFKI OZ, 1995.
Z. Manna and A. Pnueli. Models for Reactivity, volume 30. Acta Informatica, 1993.
B. Dasarathy. Timing constraints of real-time systems: Constructs for expressing them, methods of validating them. IEEE Transactions on Software Engineering, SE-11(1):80–86, January 1985.
D. Harel. Statecharts: A visual formalism for complex systems. Science of Computer Programming, 8:231–274, 1987.
J.L. Paterson. Petri Net Theory and the Modeling of Systems. Prentice-Hall, 1981.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg Berlin Heidelberg
About this paper
Cite this paper
Hollingworth, K., Saeed, A. (1998). CoRSA - A Constraint Based Approach to Requirements and Safety Analysis. In: Ehrenberger, W. (eds) Computer Safety, Reliability and Security. SAFECOMP 1998. Lecture Notes in Computer Science, vol 1516. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49646-7_1
Download citation
DOI: https://doi.org/10.1007/3-540-49646-7_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65110-9
Online ISBN: 978-3-540-49646-5
eBook Packages: Springer Book Archive