Skip to main content

Composition of Safety Argument Patterns

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9922))

Abstract

Argument structure patterns can be used to represent classes of safety arguments. Such patterns can become quite complex, making use of loops and choices, posing a potential challenge for comprehension and evaluation, offsetting the likely gains that might follow from creating arguments using them. We show how complex patterns can be constructed by composition of simpler patterns. We provide a formal basis for pattern composition and show that this notion satisfies certain desirable properties. Furthermore, we show that it is always possible to construct complex patterns by omposition in this way. We motivate this work with example patterns extracted from real aviation safety cases, and illustrate the application of the theory on the same.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    As part of NASA’s UAS traffic management (UTM) effort: http://utm.arc.nasa.gov/.

  2. 2.

    To our knowledge, at least in the US, and within a non-military context.

  3. 3.

    Due to space constraints, and for figure legibility, we omit the contextual nodes (i.e., assumptions, justifications, and context) that provide additional clarification of the associated reasoning, from the patterns in Fig. 1. Also note that, in some cases, the strategies in these patterns include the safety measures used to achieve a goal in addition to the standard GSN strategies that provide inference explanations.

  4. 4.

    A graph where edges connect multiple vertices.

  5. 5.

    There is no single range that corresponds to the union of possibilities represented by two distinct ranges. This could be addressed, however, by generalizing annotations from ranges to logical constraints that can express dependencies between nodes.

  6. 6.

    Proofs of the theorems in the rest of this paper have been omitted due to space constraints.

  7. 7.

    For basic concepts of category theory, we refer the reader to an introductory textbook, such as [7].

  8. 8.

    Due to space constraints, neither this compound pattern nor its instance are given here.

References

  1. Berthold, R., Denney, E., Fladeland, M., Pai, G., Storms, B., Sumich, M.: Assuring ground-based detect and avoid for UAS operations. In: 33rd IEEE/AIAA Digital Avionics Systems Conference (DASC 2015), pp. 6A1-1–6A1-16, October 2014

    Google Scholar 

  2. Federal Aviation Administration (FAA): Flight Standards Information Management System, vol. 16, Unmanned Aircraft Systems. Order 8900.1, June 2014

    Google Scholar 

  3. Denney, E., Pai, G.: A methodology for the development of assurance arguments for unmanned aircraft systems. In: 33rd International System Safety Conference (ISSC 2015), August 2015

    Google Scholar 

  4. Denney, E., Pai, G., Pohl, J.: AdvoCATE: an assurance case automation toolset. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP Workshops 2012. LNCS, vol. 7613, pp. 8–21. Springer, Heidelberg (2012)

    Google Scholar 

  5. Denney, E., Pai, G.: A formal basis for safety case patterns. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 21–32. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Goal Structuring Notation Working Group: GSN Community Standard Version 1. http://www.goalstructuringnotation.info/

  7. Pierce, B.C.: Basic Category Theory for Computer Scientists. MIT Press, Cambridge (1991)

    MATH  Google Scholar 

  8. Kelly, T.: Concepts and principles of compositional safety case construction. Technical report COMSA/2001/1/1, University of York (2001)

    Google Scholar 

  9. Hawkins, R., Kelly, T.: A systematic approach for developing software safety arguments. In: 27th International System Safety Conference (ISSC 2009) (2009)

    Google Scholar 

  10. Bloomfield, R., Netkachova, K.: Building blocks for assurance cases. In: 2014 IEEE ISSRE Workshops, (ISSREW), pp. 186–191, November 2014

    Google Scholar 

  11. Denney, E., Pai, G., Whiteside, I.: Formal foundations for hierarchical safety cases. In: 16th IEEE International Symposium High Assurance Systems Engineering (HASE 2015), pp. 52–59, January 2015

    Google Scholar 

  12. Walton, D., Reed, C.: Argumentation schemes and defeasible inferences. In: Workshop on Computational Models of Natural Argument, 15th European Conference on Artificial Intelligence, pp. 11–20 (2002)

    Google Scholar 

  13. Industrial Avionics Working Group: Modular Software Safety Case Process GSN - MSSC 203 Issue 1, November 2012

    Google Scholar 

Download references

Acknowledgement

This work was funded by the SASO project under the Airspace Operations and Safety Program of NASA ARMD.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ewen Denney or Ganesh Pai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Denney, E., Pai, G. (2016). Composition of Safety Argument Patterns. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2016. Lecture Notes in Computer Science(), vol 9922. Springer, Cham. https://doi.org/10.1007/978-3-319-45477-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45477-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45476-4

  • Online ISBN: 978-3-319-45477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics