Skip to main content

A Kind of Safety Requirements Description Method of the Embedded Software Based on Ontology

  • Conference paper
  • First Online:
Requirements Engineering in the Big Data Era

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 558))

  • 896 Accesses

Abstract

With the popularization of the application of the embedded system, the embedded software has been developed rapidly and then becomes a new growing power. So the research on the safety requirements of the embedded software is becoming more and more important. However, for the analysis of safety requirements, a very important step is the description of safety requirements. This paper proposes a description method of the embedded software based on ontology. And ontology is good for sharing and reuse of knowledge, as well as automatic reasoning. For the embedded software, we use ontology to define the concepts and their relations, and then we construct a model to describe the common concepts. Finally, we give an example to prove our model useful.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boehm, B.W.: Software Engineering. IEEE Transactions on Computers 25(12), 1226–1241 (1976)

    Article  MATH  Google Scholar 

  2. Firesmith, D.G.: Engineering safety requirements. J of Object Technology 2(1), 53–68 (2003)

    Article  Google Scholar 

  3. Kemmann, D.I.S., Trapp, M., Kalmar, D.I.R.: Safety analysis for embedded software. Atzelektronik Worldwide 4(3), 10–15 (2009)

    Article  Google Scholar 

  4. Amoroso, E.G.: Fundamentals of computer security technology. Prentice-Hall, Upper Saddle River (1994)

    MATH  Google Scholar 

  5. Haley, C.B., Laney, R., Moffett, J.D., et al.: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering 34(1), 133–153 (2007)

    Article  Google Scholar 

  6. Van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th Int’l Conf Software Eng(ICSE 04). IEEE CS Press (2004)

    Google Scholar 

  7. Leveson, N.G.: Software safety: why, what, and how. Computing Surveys 18(2), 125–163 (1986)

    Article  Google Scholar 

  8. Jin, Y.: Research on Eliciting Security Requirement Methods. Computer Science (2011)

    Google Scholar 

  9. Bo, L., Wei, L., Fei, W.: Modeling method of software security requirements based on UMLsec. Computer Engineering and Design 34(9), 3124–3129 (2013). doi:10.3969/j.issn.1000-7024.2013.09.026

    Google Scholar 

  10. Chen, Z., Motet, G.: Formalizing safety requirements using controlling automata. In: Second International Conference on Dependability. DEPEND, pp. 81–86 (2009)

    Google Scholar 

  11. Kalloniatis, C., Mouratidis, H., Islam, S.: Evaluating cloud deployment scenarios based on safety and privacy requirements. Requirements Engineering 18(4), 299–319 (2013)

    Article  Google Scholar 

  12. Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5(2), 199–220 (1993)

    Article  Google Scholar 

  13. Xiao-Yong, D., Man, L., Shan, W.: A Survey on Ontology Learning Research. Journal of Software (2006)

    Google Scholar 

  14. Kaiya, H., Saeki, M.: Using domain ontology as domain knowledge for requirements elicitation. In: Proceedings of 14th IEEE International Requirements Engineering Conference, Minnesota, USA, pp. 186–195 (2006)

    Google Scholar 

  15. Hong-wei, W., Jia-chun, W., Fu, J.: A study on Ontology Model Based on Description logic. Systems Engineering 21(3), 101–106 (2003)

    Google Scholar 

  16. Chung, L., do Prado Leite, J.C.S.: On non-functional requirements in software engineering. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol. 5600, pp. 363–379. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Galvao Martins, L.E., De Oliveira, T.: A case study using a protocol to derive safety functional requirements from Fault Tree Analysis. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE), pp. 412–419. IEEE (2014)

    Google Scholar 

  18. Zhang, Y., Jones, P.L., Jetley, R.: A hazard analysis for a generic insulin infusion pump. J. Diabetes Sci. Technol. 4(2), 263–283 (2010)

    Article  Google Scholar 

  19. Yaturu, S.: Insulin therapies: Current and future trends at dawn. World Journal of Diabetes 4(1), 1–7 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huaxiao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhan, F., Wang, X., Liu, H., Liu, L. (2015). A Kind of Safety Requirements Description Method of the Embedded Software Based on Ontology. In: Liu, L., Aoyama, M. (eds) Requirements Engineering in the Big Data Era. Communications in Computer and Information Science, vol 558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48634-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48634-4_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48633-7

  • Online ISBN: 978-3-662-48634-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics