Abstract
With the popularization of the application of the embedded system, the embedded software has been developed rapidly and then becomes a new growing power. So the research on the safety requirements of the embedded software is becoming more and more important. However, for the analysis of safety requirements, a very important step is the description of safety requirements. This paper proposes a description method of the embedded software based on ontology. And ontology is good for sharing and reuse of knowledge, as well as automatic reasoning. For the embedded software, we use ontology to define the concepts and their relations, and then we construct a model to describe the common concepts. Finally, we give an example to prove our model useful.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boehm, B.W.: Software Engineering. IEEE Transactions on Computers 25(12), 1226–1241 (1976)
Firesmith, D.G.: Engineering safety requirements. J of Object Technology 2(1), 53–68 (2003)
Kemmann, D.I.S., Trapp, M., Kalmar, D.I.R.: Safety analysis for embedded software. Atzelektronik Worldwide 4(3), 10–15 (2009)
Amoroso, E.G.: Fundamentals of computer security technology. Prentice-Hall, Upper Saddle River (1994)
Haley, C.B., Laney, R., Moffett, J.D., et al.: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering 34(1), 133–153 (2007)
Van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th Int’l Conf Software Eng(ICSE 04). IEEE CS Press (2004)
Leveson, N.G.: Software safety: why, what, and how. Computing Surveys 18(2), 125–163 (1986)
Jin, Y.: Research on Eliciting Security Requirement Methods. Computer Science (2011)
Bo, L., Wei, L., Fei, W.: Modeling method of software security requirements based on UMLsec. Computer Engineering and Design 34(9), 3124–3129 (2013). doi:10.3969/j.issn.1000-7024.2013.09.026
Chen, Z., Motet, G.: Formalizing safety requirements using controlling automata. In: Second International Conference on Dependability. DEPEND, pp. 81–86 (2009)
Kalloniatis, C., Mouratidis, H., Islam, S.: Evaluating cloud deployment scenarios based on safety and privacy requirements. Requirements Engineering 18(4), 299–319 (2013)
Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5(2), 199–220 (1993)
Xiao-Yong, D., Man, L., Shan, W.: A Survey on Ontology Learning Research. Journal of Software (2006)
Kaiya, H., Saeki, M.: Using domain ontology as domain knowledge for requirements elicitation. In: Proceedings of 14th IEEE International Requirements Engineering Conference, Minnesota, USA, pp. 186–195 (2006)
Hong-wei, W., Jia-chun, W., Fu, J.: A study on Ontology Model Based on Description logic. Systems Engineering 21(3), 101–106 (2003)
Chung, L., do Prado Leite, J.C.S.: On non-functional requirements in software engineering. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol. 5600, pp. 363–379. Springer, Heidelberg (2009)
Galvao Martins, L.E., De Oliveira, T.: A case study using a protocol to derive safety functional requirements from Fault Tree Analysis. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE), pp. 412–419. IEEE (2014)
Zhang, Y., Jones, P.L., Jetley, R.: A hazard analysis for a generic insulin infusion pump. J. Diabetes Sci. Technol. 4(2), 263–283 (2010)
Yaturu, S.: Insulin therapies: Current and future trends at dawn. World Journal of Diabetes 4(1), 1–7 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhan, F., Wang, X., Liu, H., Liu, L. (2015). A Kind of Safety Requirements Description Method of the Embedded Software Based on Ontology. In: Liu, L., Aoyama, M. (eds) Requirements Engineering in the Big Data Era. Communications in Computer and Information Science, vol 558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48634-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-48634-4_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48633-7
Online ISBN: 978-3-662-48634-4
eBook Packages: Computer ScienceComputer Science (R0)