SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Outline
                                   Introduction
Development of the overall safety requirements
                                    Verification
                              Further readings




                  Software Requirements for
                   Safety-Related Systems

                                    Vittorio Giovara

                                    Politecnico di Torino


                              Software Engineering

                                       16/04/2008


                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                         Introduction
      Development of the overall safety requirements
                                          Verification
                                    Further readings

Creative Common Licence v3.0 Attribution - ShareAlike
  You are free
      to copy, distribute, display, and perform the work
      to make derivative works
      to make commercial use of the work
  Under the following conditions
      Attribution. You must give the original author credit.
      Share Alike. If you alter, transform, or build upon this work,
      you may distribute the resulting work only under a license
      identical to this one.
      For any reuse or distribution, you must make clear to oth-
      ers the license terms of this work.
  Any of these conditions can be waived if you get permission from
  the copyright holder.
                                     Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                      Introduction
   Development of the overall safety requirements
                                       Verification
                                 Further readings



        You can read more about this licence here
http://creativecommons.org/licenses/by-sa/3.0/




             Corrections, suggestions, contributions and
                      translations are welcome!

                                          Document revision 1.0


                                  Vittorio Giovara     Software Requirements for Safety-Related Systems
Outline
                                        Introduction
     Development of the overall safety requirements
                                         Verification
                                   Further readings


1   Introduction
       Safety-Related Systems
       The International Electrotechnical Commission
       Safety Lifecycle
       Software Process
2   Development of the overall safety requirements
      Overview
      Specification
      Planning
      Design and Development
      Validation
3   Verification
      Objective
      Functional Requirements
      Non-functional requirements
4   Further readings

                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                                        Safety-Related Systems
                                         Introduction
                                                        The International Electrotechnical Commission
      Development of the overall safety requirements
                                                        Safety Lifecycle
                                          Verification
                                                        Software Process
                                    Further readings

IEC-61508




   These slides provide a schematical overview of the Functional
     and non-Functional Requirements for software programs
  adherent to the IEC- 61508 standard for safety-related software
                             systems.




                                     Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                                        Safety-Related Systems
                                         Introduction
                                                        The International Electrotechnical Commission
      Development of the overall safety requirements
                                                        Safety Lifecycle
                                          Verification
                                                        Software Process
                                    Further readings

What is IEC?

                 International Electrotechnical Commission
  The IEC is a not-for-profit, non-governmental international standards
  organization that prepares and publishes International Standards for
  all electrical, electronic and related technologies - collectively known
  as electrotechnology. IEC standards cover a vast range of
  technologies from power generation, transmission and distribution to
  home appliances and office equipment, semiconductors, fibre optics,
  batteries, solar energy, nanotechnology and marine energy as well as
  many others. The IEC also manages conformity assessment
  schemes that certify whether equipment, systems or components
  conform to its International Standards. The IEC publishes standards
  with the IEEE and develops standards jointly with the ISO as well as
  the ITU.
                                     Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                                        Safety-Related Systems
                                         Introduction
                                                        The International Electrotechnical Commission
      Development of the overall safety requirements
                                                        Safety Lifecycle
                                          Verification
                                                        Software Process
                                    Further readings

Realisation Phase




                                     Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                                  Safety-Related Systems
                                   Introduction
                                                  The International Electrotechnical Commission
Development of the overall safety requirements
                                                  Safety Lifecycle
                                    Verification
                                                  Software Process
                              Further readings




                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                                       Safety-Related Systems
                                        Introduction
                                                       The International Electrotechnical Commission
     Development of the overall safety requirements
                                                       Safety Lifecycle
                                         Verification
                                                       Software Process
                                   Further readings

The V model




                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Software configuration management




     appliance of administrative and technical controls
     throughout the software safety lifecycle;
     guarantee of achievement of all the required software
     safety rules;
     mantainance of all the configuration items for the saftety
     related system;
     documentation of formal releases.




                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                         Introduction   Specification
      Development of the overall safety requirements    Planning
                                          Verification   Design and Development
                                    Further readings    Validation

Lifecycle requirements

      select and specify a safety lifecycle;
      integrate safety and quality assurance procedures into
      lifecycle activities;
      divide into elementary activities every phase, specifying
      scope, inputs and outputs for each phase;
      use appropriate techniques and measures for each
      lifecycle phase;
      document the results of each activity of the software safety
      lifecycle;
      repeat any previous phase if a phase is changed in the
      software safety lifecycle.

                                     Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Functional Requirements

      the software developer must consider the following:
         1   safety functions;
         2   configuration or architecture of the system;
         3   hardware safety integrity requirements;
         4   software safety integrity requirements.
      the specified requirements for software safety must be
      expressed and structured so that they are:
         1   clear, precise, unequivocal, verifiable, testable, mantainable
             and feasable, commensurate with the safety integrity level;
         2   traceable back to the specification of the safety
             requirements of the safety-related system;
         3   free of terminology and description which are ambiguous
             and/or not understood by those who will utilize the
             document at any stage of the software safety lifecycle.

                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation




all releveants modes of operation of the software must be
detailed in the specified requirements for software safety;
the software requirements specification must specify and
document any safety-related or relevant constraints
vetween the hardware and the software;
the software safety requirements specification must
express the required safety properties of the product, but
not of the project.




                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Non-Functional Requirements

      the software developer should consider the following:
         1   capacity and response time performance;
         2   equipment and operator interfaces.
      the specification of the requirements should be detailed to
      allow following phases to achieve the required safety
      integrity;
      the software developer should establish procedure for
      resolving any disagreeents over the assignment of the
      software safety integrity level;
      when the system is perfoming non-safety functions, the
      software requirements should clearly identify the running
      functions;

                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation




the software safety requirements specification should
consider the following:
    1   software self-monitoring;
    2   monitoring of the programmable electronics hardware,
        sensors and actuators;
    3   periodic testing of safety functions while the system is
        running;
    4   enabling saftey functions to be testable when the software
        is operational.




                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Functional Requirements

      the planning for validating the software safety must
      consider the following:
         1   identification of the relevant modes of the software
             requirement operation, including:
                  - preparation for use including setting and adjustment;
                  - start up; teach; automatic; manual; semi-automatic; steady
                    state of operation;
                  - re-setting; shut down; mantainance;
                  - reasonably foreseeable abnormal conditions.
         2   identification of the safety-related software which needs to
             be validated for each mode of operation before
             commissioning commences;
         3   the pass/fail criteria;
         4   the policies and procedures for evaluating the results of the
             validation, particularly failures;

                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation



planning must be carried out to specify the steps, both
procedural and technical, that will be used to demonstrate
that the software satisfies its saftey requirements;
the technical strategy for the validation of safety-related
software must include the following information:
    1   choice of manual or automated techniques or both;
    2   choice of static or dynamic techniques or both;
    3   choice of analytical or statistical techniques or both;
the pass/fail criteia for accomplishing software must
include:
    1   the required input signals with their sequences and their
        values;
    2   the anticipated output signals with their sequences and
        their values;
    3   other acceptance criteria (like memory usage, timing and
        value tolerance).
                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Non-Functional Requirements



      the planning for validating the software safety should
      consider the following:
         1   details of when the validation shall take plaace;
         2   details of those who will carry out the validation;
         3   the technical strategy for the validation;
         4   specific reference to the specific requirements for software
             safety;
         5   the required environment in which the validation activities
             are to take place.




                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                      Introduction   Specification
   Development of the overall safety requirements    Planning
                                       Verification   Design and Development
                                 Further readings    Validation




Objectives
  - create a software architecure that fulfils the specified
    requirements for the software safety with respect to the required
    safety integrity level;
  - review and evaluate the requirements placed on the hardware
    architecture of the safety-related system;
  - select a suitable set of tools, like languages and compilers for
    the required integrity level;
  - design and implement software that fulfils the specified
    requirements for the software safety with respect to the required
    safety integrity level, which is capeable of being safely modified;
  - verify that the requirements for software safety have been
    achieved.


                                  Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Functional Requirements

      the design method must possess features that facilitate:
         1   abstraction, modularity and other features to control
             complexity;
         2   the expession of:
                  -   functionality
                  -   information flow betwwn components
                  -   sequencing and time related information
                  -   timing constraints
                  -   concurrency
                  -   data structures and their properties
                  -   design assumptions and their dependencies
         3   comprehension by developers and others who need to
             understand the design;
         4   verification and validation;

                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation




when the software is implemented with both safety and
non-safety functions, then all of the software must be
treated as safety-related;
when the software is implemented with safety functions of
different safety integrity levels, then all of the software must
be treated as belonging to the highest safety integrity level;
the software design must include (accordingly with the
safety integrity level) self-monitoring of control flow and
data flow; on failure detection appropriate actions must be
taken;
if standard or previously developed software is used in the
design phase, then it must be clearly identified and respect
the requirements of the current system;

                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation



a suitable set of integrated tools must be selected for the
required safety integrity level; such tools include:
        -   languages
        -   compilers
        -   configuration
        -   management tools
        -   automatic testing tools (when applicable)
the programming language chosen for the desing must:
    1       have a translator/compiler with a certificate validation to a
            recognised national or internation standard;
    2       be completely and unambiguously defined or restricted to
            clearly defined fetures;
    3       match the characteristics of the application;
    4       contain features that facilitate the detection of programming
            mistakes;
    5       support features that match the design method.

                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation


the source code must:
    1   be readable, understandable and testable;
    2   satisfy the specified requirements for software module
        design;
    3   satisfy the specified requirements of the coding standards;
    4   satisfy all relevant requirements specified during safety
        planning.
the specified software integration tests must specify the
following:
    1   the division of the software into manageable integration
        sets;
    2   tests cases and test data;
    3   types of tests to be perfomed;
    4   test environment, tools, configuration and programs;
    5   test criteria on which the completion of the test will be
        judged;
    6   procedures for corrective action on failure of test.
                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation




each software module must be tested as specified during
software design and consequentely documented;
software integration tests must be specified concurrently
during the design and development phase.




                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Non-Functional Requirements

      depending on the nature of the software development,
      responsibility for conformance with software design
      requirements can rest with the supplier alone or with the
      user alone or with both; the division o responsability should
      be determined during safety planning;
      testability and the capacity for safe modification should be
      considered during the design activities in order to facilitate
      implementation of these properties in the final system;
      software modification should be allowed with modularity,
      information hiding or encapsulation;
      the design should include software functions to execution
      proof test and all diagnostic tests;
      each module of software code should be reviewed;
                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation


the coding standards should be reviewed and used for the
development of all safety-related software;
the coding stardards should specify good programming
practice, proscribe unsafe language features and specify
procedures for source code documentation;
appropriate software system integration tests should be
specified to ensure that the software systems satisfies the
specified requirements safety;
the result of software integration testing should be
documented, stating the test results and whether the
objectives and criteria of the test have been met;
in software integration, any modification or change to the
software should be subject to an impact analysis in order
to determine the impact on the other sofware modules and
the necessary re-verification and re-design activities.
                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Functional Requirements

      the validation activities must be carried out as specified
      during sofware safety validation planning;
      the result of software safety validation must be
      documented and mad available, outlining:
         1   a chronological record of the validation activities;
         2   the version of the software safety validation plan being
             used;
         3   the safety function being validated, together with reference
             to the software afety validation plan;
         4   tools and equipment used together with calibration data;
         5   the results of the validation activity;
         6   discrepancies between expected and actual results.
      testing must be the main validation method for software;
      animation and modelling may be used to supplement the
      validation activities;
                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                   Introduction   Specification
Development of the overall safety requirements    Planning
                                    Verification   Design and Development
                              Further readings    Validation




the software must be exercised by a simulation of:
    1   input signals present during normal operation;
    2   anticipated occurrences;
    3   undesired condtion requiring system action.
all equipment used for validation must be qualified
according to a specification traceable to an internatation or
national standard;
equipment used for validation must be qualified
appropriately and any tools used (hardware or software)
must be proved suitable for the purpose.




                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline   Overview
                                        Introduction   Specification
     Development of the overall safety requirements    Planning
                                         Verification   Design and Development
                                   Further readings    Validation

Non-Functional Requirements

      if the compliance with the requirements for sofware safety
      has already been established, then the validation shouldn’t
      be repeated;
      when discrepancies occur between expected and actual
      results, the analysis made and the decisions taken should
      be documented as part of the results of the software safety
      validation;
      the tests should show that all the specified requirements
      for software requirements are correctly performed and the
      software system doesn’t preform unintended functions;
      the documentated results should state either that the
      software has passed the validation or the reason for its
      failure.
                                    Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                       Introduction   Objective
    Development of the overall safety requirements    Functional Requirements
                                        Verification   Non-functional requirements
                                  Further readings




The objective of the requirements of this part is, to the extent
required by the safety integrity level, to test and evaluate the
outputs from a given software safety lifecycle phase to ensure
correctness and consistency with respect to the outputs and
standards provided as input to that phase.




                                   Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                   Introduction   Objective
Development of the overall safety requirements    Functional Requirements
                                    Verification   Non-functional requirements
                              Further readings


the software verification planning must refer to criteria,
techniques and tools addressing
    1   the evaluation of the safety integrity requirements;
    2   the section and documentation of verifiaction strategies,
        activities and techniques;
    3   the selection and utilisation of verification tools;
    4   the evaluation of verification results;
    5   the corrective actions to be taken.
after specifying the software safety requirements,
verification must
    1   consider whether the specified requirements adequately
        fulfil the requirements for functionality, safety integrity and
        any other requirements for safety planning;
    2   consider whether the software safety validation planning
        adequately fulfils the specified software requirements.
    3   check for incompatibilies between the specified safety
        requirements and the software validation planning.
                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                   Introduction   Objective
Development of the overall safety requirements    Functional Requirements
                                    Verification   Non-functional requirements
                              Further readings




after specifying the software system design, verification
must
    1   consider whether the specified tests for integrtion
        adequately fulfil the specified software system design;
    2   consider whether the attributes of each major component of
        the specified software system design are adequate with
        respect to
             -   feasability for further verification
             -   testability for further verification
             -   readability by the development and verification team
             -   safe modificiation to permit further evolution
    3   check for incompatibilies between the description of the
        software system design and the specified tests of the
        software system integration;


                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                   Introduction   Objective
Development of the overall safety requirements    Functional Requirements
                                    Verification   Non-functional requirements
                              Further readings




the verification of software must be planned concurrently
with the development for each pahse of the software safety
lifecycle and this infomration shall be documented;
the verification activities must include:
    1   verification of software safety requirements;
    2   verification of software architecture;
    3   verification of software system design;
    4   verification of software module design;
    5   verification of code;
    6   data verification;
    7   software module testing;
    8   software integration testing;
    9   programmable electronics integration testing;
   10   software safety requirements testsing (validation).


                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                   Introduction   Objective
Development of the overall safety requirements    Functional Requirements
                                    Verification   Non-functional requirements
                              Further readings


evidence should be documented to show that the phase
being verified has completely been satisfied;
all essential information from each phase of the software
safety lifcycle need for execution of the following phase
should be available and verofied; outputs include:
    1   adequacy of the specification, design description or code in
        the current phase for:
             -   functionality
             -   safety integrity
             -   performance
             -   readability by the development team
             -   testability for further verification
             -   safe modificiation to permit further evolution
    2   adequacy of the validation planning and/or tests specified
        for the current phase;
    3   check for incompatibilies between the tests specified in the
        current and the previouse phase and the outputs within the
        current phase.
                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                   Introduction   Objective
Development of the overall safety requirements    Functional Requirements
                                    Verification   Non-functional requirements
                              Further readings




after each verification, the correspondent documentation
should include:
    1   identification of items to be verified;
    2   identification of the information against which the
        verification has been done;
    3   non conformances.
the source code should be verified by static methods to
ensure conformance to the specified design of the
software module, the requred coding standards and the
requirements of safety planning.




                               Vittorio Giovara   Software Requirements for Safety-Related Systems
Outline
                                       Introduction
    Development of the overall safety requirements
                                        Verification
                                  Further readings




Please see as reference
    http://www.iec.ch/
    http://en.wikipedia.org/wiki/Standards_
    organization
    International Standard, IEC 61508, Functional safety of
    electrical/electronic/programmable electronic safety-related
    systems, Part 3, First edition, 1998

Original document localized at
    http://www.scribd.com/people/view/59403



                                   Vittorio Giovara   Software Requirements for Safety-Related Systems

Contenu connexe

En vedette

Hirschmann: Automotive SPICE Requirements for development process and tools
Hirschmann: Automotive SPICE Requirements for development process and tools Hirschmann: Automotive SPICE Requirements for development process and tools
Hirschmann: Automotive SPICE Requirements for development process and tools Intland Software GmbH
 
Requirements are King – Better Requirements = Better Software
Requirements are King – Better Requirements = Better SoftwareRequirements are King – Better Requirements = Better Software
Requirements are King – Better Requirements = Better SoftwareCA Technologies
 
Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)Dagmar Monett
 
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)Dagmar Monett
 
A Structured Approach to Requirements Analysis (lecture slides)
A Structured Approach to Requirements Analysis (lecture slides)A Structured Approach to Requirements Analysis (lecture slides)
A Structured Approach to Requirements Analysis (lecture slides)Dagmar Monett
 
Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Dagmar Monett
 
Requirements Engineering Methods for Documenting Requirements (lecture slides)
Requirements Engineering Methods for Documenting Requirements (lecture slides)Requirements Engineering Methods for Documenting Requirements (lecture slides)
Requirements Engineering Methods for Documenting Requirements (lecture slides)Dagmar Monett
 
Modelling Software Requirements: Important diagrams and templates (lecture sl...
Modelling Software Requirements: Important diagrams and templates (lecture sl...Modelling Software Requirements: Important diagrams and templates (lecture sl...
Modelling Software Requirements: Important diagrams and templates (lecture sl...Dagmar Monett
 
How To Review Software Requirements
How To Review Software RequirementsHow To Review Software Requirements
How To Review Software RequirementsCraig Brown
 
Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...
Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...
Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...Ivano Malavolta
 
Requirements Engineering Process
Requirements Engineering ProcessRequirements Engineering Process
Requirements Engineering ProcessJomel Penalba
 
ISO/TS 16949 Rules 4th edition training
ISO/TS 16949 Rules 4th edition trainingISO/TS 16949 Rules 4th edition training
ISO/TS 16949 Rules 4th edition trainingDQS Inc.
 
Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Minhas Kamal
 
ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016Toyo Gustaman
 
software development, process model, requirement engineering, srs, structured...
software development, process model, requirement engineering, srs, structured...software development, process model, requirement engineering, srs, structured...
software development, process model, requirement engineering, srs, structured...Ashok Mohanty
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationVishal Singh
 
An Introduction to Software Failure Modes Effects Analysis (SFMEA)
An Introduction to Software Failure Modes Effects Analysis (SFMEA)An Introduction to Software Failure Modes Effects Analysis (SFMEA)
An Introduction to Software Failure Modes Effects Analysis (SFMEA)Ann Marie Neufelder
 
Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineeringPreeti Mishra
 

En vedette (18)

Hirschmann: Automotive SPICE Requirements for development process and tools
Hirschmann: Automotive SPICE Requirements for development process and tools Hirschmann: Automotive SPICE Requirements for development process and tools
Hirschmann: Automotive SPICE Requirements for development process and tools
 
Requirements are King – Better Requirements = Better Software
Requirements are King – Better Requirements = Better SoftwareRequirements are King – Better Requirements = Better Software
Requirements are King – Better Requirements = Better Software
 
Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)
 
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
 
A Structured Approach to Requirements Analysis (lecture slides)
A Structured Approach to Requirements Analysis (lecture slides)A Structured Approach to Requirements Analysis (lecture slides)
A Structured Approach to Requirements Analysis (lecture slides)
 
Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)
 
Requirements Engineering Methods for Documenting Requirements (lecture slides)
Requirements Engineering Methods for Documenting Requirements (lecture slides)Requirements Engineering Methods for Documenting Requirements (lecture slides)
Requirements Engineering Methods for Documenting Requirements (lecture slides)
 
Modelling Software Requirements: Important diagrams and templates (lecture sl...
Modelling Software Requirements: Important diagrams and templates (lecture sl...Modelling Software Requirements: Important diagrams and templates (lecture sl...
Modelling Software Requirements: Important diagrams and templates (lecture sl...
 
How To Review Software Requirements
How To Review Software RequirementsHow To Review Software Requirements
How To Review Software Requirements
 
Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...
Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...
Requirements engineering with UML [Software Modeling] [Computer Science] [Vri...
 
Requirements Engineering Process
Requirements Engineering ProcessRequirements Engineering Process
Requirements Engineering Process
 
ISO/TS 16949 Rules 4th edition training
ISO/TS 16949 Rules 4th edition trainingISO/TS 16949 Rules 4th edition training
ISO/TS 16949 Rules 4th edition training
 
Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)
 
ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016
 
software development, process model, requirement engineering, srs, structured...
software development, process model, requirement engineering, srs, structured...software development, process model, requirement engineering, srs, structured...
software development, process model, requirement engineering, srs, structured...
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
An Introduction to Software Failure Modes Effects Analysis (SFMEA)
An Introduction to Software Failure Modes Effects Analysis (SFMEA)An Introduction to Software Failure Modes Effects Analysis (SFMEA)
An Introduction to Software Failure Modes Effects Analysis (SFMEA)
 
Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineering
 

Similaire à Software Requirements for Safety-related Systems

国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryAshley Zupkus
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsIRJET Journal
 
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen HypervisorSafety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen HypervisorStefano Stabellini
 
Functional-Safety-Overview-UL.ppt
Functional-Safety-Overview-UL.pptFunctional-Safety-Overview-UL.ppt
Functional-Safety-Overview-UL.pptssuserba01d94
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesDigital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesATC
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfICS
 
Misra C Software Development Standard
Misra C Software Development StandardMisra C Software Development Standard
Misra C Software Development StandardVittorio Giovara
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Softwareijtsrd
 
Software controlled electron mechanical systems reliability
Software controlled electron mechanical systems reliabilitySoftware controlled electron mechanical systems reliability
Software controlled electron mechanical systems reliabilityASQ Reliability Division
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentationdanphilpott
 
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...IJSEA
 
An Approach To Software Development Life Cycle
An Approach To Software Development Life CycleAn Approach To Software Development Life Cycle
An Approach To Software Development Life CycleBettyBaker
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 

Similaire à Software Requirements for Safety-related Systems (20)

国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen HypervisorSafety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
 
Functional-Safety-Overview-UL.ppt
Functional-Safety-Overview-UL.pptFunctional-Safety-Overview-UL.ppt
Functional-Safety-Overview-UL.ppt
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesDigital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Ray3
Ray3Ray3
Ray3
 
Misra C Software Development Standard
Misra C Software Development StandardMisra C Software Development Standard
Misra C Software Development Standard
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
 
Software controlled electron mechanical systems reliability
Software controlled electron mechanical systems reliabilitySoftware controlled electron mechanical systems reliability
Software controlled electron mechanical systems reliability
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
 
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
 
An Approach To Software Development Life Cycle
An Approach To Software Development Life CycleAn Approach To Software Development Life Cycle
An Approach To Software Development Life Cycle
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 

Plus de Vittorio Giovara

Color me intrigued: A jaunt through color technology in video
Color me intrigued: A jaunt through color technology in videoColor me intrigued: A jaunt through color technology in video
Color me intrigued: A jaunt through color technology in videoVittorio Giovara
 
An overview on 10 bit video: UHDTV, HDR, and coding efficiency
An overview on 10 bit video: UHDTV, HDR, and coding efficiencyAn overview on 10 bit video: UHDTV, HDR, and coding efficiency
An overview on 10 bit video: UHDTV, HDR, and coding efficiencyVittorio Giovara
 
Introduction to video reverse engineering
Introduction to video reverse engineeringIntroduction to video reverse engineering
Introduction to video reverse engineeringVittorio Giovara
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationVittorio Giovara
 
Fuzzing Techniques for Software Vulnerability Discovery
Fuzzing Techniques for Software Vulnerability DiscoveryFuzzing Techniques for Software Vulnerability Discovery
Fuzzing Techniques for Software Vulnerability DiscoveryVittorio Giovara
 
Parallel and Distributed Computing on Low Latency Clusters
Parallel and Distributed Computing on Low Latency ClustersParallel and Distributed Computing on Low Latency Clusters
Parallel and Distributed Computing on Low Latency ClustersVittorio Giovara
 
Microprocessor-based Systems 48/32bit Division Algorithm
Microprocessor-based Systems 48/32bit Division AlgorithmMicroprocessor-based Systems 48/32bit Division Algorithm
Microprocessor-based Systems 48/32bit Division AlgorithmVittorio Giovara
 
OpenSSL User Manual and Data Format
OpenSSL User Manual and Data FormatOpenSSL User Manual and Data Format
OpenSSL User Manual and Data FormatVittorio Giovara
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmVittorio Giovara
 

Plus de Vittorio Giovara (12)

Color me intrigued: A jaunt through color technology in video
Color me intrigued: A jaunt through color technology in videoColor me intrigued: A jaunt through color technology in video
Color me intrigued: A jaunt through color technology in video
 
An overview on 10 bit video: UHDTV, HDR, and coding efficiency
An overview on 10 bit video: UHDTV, HDR, and coding efficiencyAn overview on 10 bit video: UHDTV, HDR, and coding efficiency
An overview on 10 bit video: UHDTV, HDR, and coding efficiency
 
Introduction to video reverse engineering
Introduction to video reverse engineeringIntroduction to video reverse engineering
Introduction to video reverse engineering
 
Il Caso Ryanair
Il Caso RyanairIl Caso Ryanair
Il Caso Ryanair
 
I Mercati Geografici
I Mercati GeograficiI Mercati Geografici
I Mercati Geografici
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Crittografia Quantistica
Crittografia QuantisticaCrittografia Quantistica
Crittografia Quantistica
 
Fuzzing Techniques for Software Vulnerability Discovery
Fuzzing Techniques for Software Vulnerability DiscoveryFuzzing Techniques for Software Vulnerability Discovery
Fuzzing Techniques for Software Vulnerability Discovery
 
Parallel and Distributed Computing on Low Latency Clusters
Parallel and Distributed Computing on Low Latency ClustersParallel and Distributed Computing on Low Latency Clusters
Parallel and Distributed Computing on Low Latency Clusters
 
Microprocessor-based Systems 48/32bit Division Algorithm
Microprocessor-based Systems 48/32bit Division AlgorithmMicroprocessor-based Systems 48/32bit Division Algorithm
Microprocessor-based Systems 48/32bit Division Algorithm
 
OpenSSL User Manual and Data Format
OpenSSL User Manual and Data FormatOpenSSL User Manual and Data Format
OpenSSL User Manual and Data Format
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
 

Dernier

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Software Requirements for Safety-related Systems

  • 1. Outline Introduction Development of the overall safety requirements Verification Further readings Software Requirements for Safety-Related Systems Vittorio Giovara Politecnico di Torino Software Engineering 16/04/2008 Vittorio Giovara Software Requirements for Safety-Related Systems
  • 2. Outline Introduction Development of the overall safety requirements Verification Further readings Creative Common Licence v3.0 Attribution - ShareAlike You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must give the original author credit. Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. For any reuse or distribution, you must make clear to oth- ers the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 3. Outline Introduction Development of the overall safety requirements Verification Further readings You can read more about this licence here http://creativecommons.org/licenses/by-sa/3.0/ Corrections, suggestions, contributions and translations are welcome! Document revision 1.0 Vittorio Giovara Software Requirements for Safety-Related Systems
  • 4. Outline Introduction Development of the overall safety requirements Verification Further readings 1 Introduction Safety-Related Systems The International Electrotechnical Commission Safety Lifecycle Software Process 2 Development of the overall safety requirements Overview Specification Planning Design and Development Validation 3 Verification Objective Functional Requirements Non-functional requirements 4 Further readings Vittorio Giovara Software Requirements for Safety-Related Systems
  • 5. Outline Safety-Related Systems Introduction The International Electrotechnical Commission Development of the overall safety requirements Safety Lifecycle Verification Software Process Further readings IEC-61508 These slides provide a schematical overview of the Functional and non-Functional Requirements for software programs adherent to the IEC- 61508 standard for safety-related software systems. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 6. Outline Safety-Related Systems Introduction The International Electrotechnical Commission Development of the overall safety requirements Safety Lifecycle Verification Software Process Further readings What is IEC? International Electrotechnical Commission The IEC is a not-for-profit, non-governmental international standards organization that prepares and publishes International Standards for all electrical, electronic and related technologies - collectively known as electrotechnology. IEC standards cover a vast range of technologies from power generation, transmission and distribution to home appliances and office equipment, semiconductors, fibre optics, batteries, solar energy, nanotechnology and marine energy as well as many others. The IEC also manages conformity assessment schemes that certify whether equipment, systems or components conform to its International Standards. The IEC publishes standards with the IEEE and develops standards jointly with the ISO as well as the ITU. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 7. Outline Safety-Related Systems Introduction The International Electrotechnical Commission Development of the overall safety requirements Safety Lifecycle Verification Software Process Further readings Realisation Phase Vittorio Giovara Software Requirements for Safety-Related Systems
  • 8. Outline Safety-Related Systems Introduction The International Electrotechnical Commission Development of the overall safety requirements Safety Lifecycle Verification Software Process Further readings Vittorio Giovara Software Requirements for Safety-Related Systems
  • 9. Outline Safety-Related Systems Introduction The International Electrotechnical Commission Development of the overall safety requirements Safety Lifecycle Verification Software Process Further readings The V model Vittorio Giovara Software Requirements for Safety-Related Systems
  • 10. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Software configuration management appliance of administrative and technical controls throughout the software safety lifecycle; guarantee of achievement of all the required software safety rules; mantainance of all the configuration items for the saftety related system; documentation of formal releases. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 11. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Lifecycle requirements select and specify a safety lifecycle; integrate safety and quality assurance procedures into lifecycle activities; divide into elementary activities every phase, specifying scope, inputs and outputs for each phase; use appropriate techniques and measures for each lifecycle phase; document the results of each activity of the software safety lifecycle; repeat any previous phase if a phase is changed in the software safety lifecycle. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 12. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Functional Requirements the software developer must consider the following: 1 safety functions; 2 configuration or architecture of the system; 3 hardware safety integrity requirements; 4 software safety integrity requirements. the specified requirements for software safety must be expressed and structured so that they are: 1 clear, precise, unequivocal, verifiable, testable, mantainable and feasable, commensurate with the safety integrity level; 2 traceable back to the specification of the safety requirements of the safety-related system; 3 free of terminology and description which are ambiguous and/or not understood by those who will utilize the document at any stage of the software safety lifecycle. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 13. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation all releveants modes of operation of the software must be detailed in the specified requirements for software safety; the software requirements specification must specify and document any safety-related or relevant constraints vetween the hardware and the software; the software safety requirements specification must express the required safety properties of the product, but not of the project. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 14. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Non-Functional Requirements the software developer should consider the following: 1 capacity and response time performance; 2 equipment and operator interfaces. the specification of the requirements should be detailed to allow following phases to achieve the required safety integrity; the software developer should establish procedure for resolving any disagreeents over the assignment of the software safety integrity level; when the system is perfoming non-safety functions, the software requirements should clearly identify the running functions; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 15. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation the software safety requirements specification should consider the following: 1 software self-monitoring; 2 monitoring of the programmable electronics hardware, sensors and actuators; 3 periodic testing of safety functions while the system is running; 4 enabling saftey functions to be testable when the software is operational. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 16. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Functional Requirements the planning for validating the software safety must consider the following: 1 identification of the relevant modes of the software requirement operation, including: - preparation for use including setting and adjustment; - start up; teach; automatic; manual; semi-automatic; steady state of operation; - re-setting; shut down; mantainance; - reasonably foreseeable abnormal conditions. 2 identification of the safety-related software which needs to be validated for each mode of operation before commissioning commences; 3 the pass/fail criteria; 4 the policies and procedures for evaluating the results of the validation, particularly failures; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 17. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation planning must be carried out to specify the steps, both procedural and technical, that will be used to demonstrate that the software satisfies its saftey requirements; the technical strategy for the validation of safety-related software must include the following information: 1 choice of manual or automated techniques or both; 2 choice of static or dynamic techniques or both; 3 choice of analytical or statistical techniques or both; the pass/fail criteia for accomplishing software must include: 1 the required input signals with their sequences and their values; 2 the anticipated output signals with their sequences and their values; 3 other acceptance criteria (like memory usage, timing and value tolerance). Vittorio Giovara Software Requirements for Safety-Related Systems
  • 18. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Non-Functional Requirements the planning for validating the software safety should consider the following: 1 details of when the validation shall take plaace; 2 details of those who will carry out the validation; 3 the technical strategy for the validation; 4 specific reference to the specific requirements for software safety; 5 the required environment in which the validation activities are to take place. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 19. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Objectives - create a software architecure that fulfils the specified requirements for the software safety with respect to the required safety integrity level; - review and evaluate the requirements placed on the hardware architecture of the safety-related system; - select a suitable set of tools, like languages and compilers for the required integrity level; - design and implement software that fulfils the specified requirements for the software safety with respect to the required safety integrity level, which is capeable of being safely modified; - verify that the requirements for software safety have been achieved. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 20. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Functional Requirements the design method must possess features that facilitate: 1 abstraction, modularity and other features to control complexity; 2 the expession of: - functionality - information flow betwwn components - sequencing and time related information - timing constraints - concurrency - data structures and their properties - design assumptions and their dependencies 3 comprehension by developers and others who need to understand the design; 4 verification and validation; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 21. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation when the software is implemented with both safety and non-safety functions, then all of the software must be treated as safety-related; when the software is implemented with safety functions of different safety integrity levels, then all of the software must be treated as belonging to the highest safety integrity level; the software design must include (accordingly with the safety integrity level) self-monitoring of control flow and data flow; on failure detection appropriate actions must be taken; if standard or previously developed software is used in the design phase, then it must be clearly identified and respect the requirements of the current system; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 22. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation a suitable set of integrated tools must be selected for the required safety integrity level; such tools include: - languages - compilers - configuration - management tools - automatic testing tools (when applicable) the programming language chosen for the desing must: 1 have a translator/compiler with a certificate validation to a recognised national or internation standard; 2 be completely and unambiguously defined or restricted to clearly defined fetures; 3 match the characteristics of the application; 4 contain features that facilitate the detection of programming mistakes; 5 support features that match the design method. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 23. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation the source code must: 1 be readable, understandable and testable; 2 satisfy the specified requirements for software module design; 3 satisfy the specified requirements of the coding standards; 4 satisfy all relevant requirements specified during safety planning. the specified software integration tests must specify the following: 1 the division of the software into manageable integration sets; 2 tests cases and test data; 3 types of tests to be perfomed; 4 test environment, tools, configuration and programs; 5 test criteria on which the completion of the test will be judged; 6 procedures for corrective action on failure of test. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 24. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation each software module must be tested as specified during software design and consequentely documented; software integration tests must be specified concurrently during the design and development phase. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 25. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Non-Functional Requirements depending on the nature of the software development, responsibility for conformance with software design requirements can rest with the supplier alone or with the user alone or with both; the division o responsability should be determined during safety planning; testability and the capacity for safe modification should be considered during the design activities in order to facilitate implementation of these properties in the final system; software modification should be allowed with modularity, information hiding or encapsulation; the design should include software functions to execution proof test and all diagnostic tests; each module of software code should be reviewed; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 26. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation the coding standards should be reviewed and used for the development of all safety-related software; the coding stardards should specify good programming practice, proscribe unsafe language features and specify procedures for source code documentation; appropriate software system integration tests should be specified to ensure that the software systems satisfies the specified requirements safety; the result of software integration testing should be documented, stating the test results and whether the objectives and criteria of the test have been met; in software integration, any modification or change to the software should be subject to an impact analysis in order to determine the impact on the other sofware modules and the necessary re-verification and re-design activities. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 27. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Functional Requirements the validation activities must be carried out as specified during sofware safety validation planning; the result of software safety validation must be documented and mad available, outlining: 1 a chronological record of the validation activities; 2 the version of the software safety validation plan being used; 3 the safety function being validated, together with reference to the software afety validation plan; 4 tools and equipment used together with calibration data; 5 the results of the validation activity; 6 discrepancies between expected and actual results. testing must be the main validation method for software; animation and modelling may be used to supplement the validation activities; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 28. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation the software must be exercised by a simulation of: 1 input signals present during normal operation; 2 anticipated occurrences; 3 undesired condtion requiring system action. all equipment used for validation must be qualified according to a specification traceable to an internatation or national standard; equipment used for validation must be qualified appropriately and any tools used (hardware or software) must be proved suitable for the purpose. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 29. Outline Overview Introduction Specification Development of the overall safety requirements Planning Verification Design and Development Further readings Validation Non-Functional Requirements if the compliance with the requirements for sofware safety has already been established, then the validation shouldn’t be repeated; when discrepancies occur between expected and actual results, the analysis made and the decisions taken should be documented as part of the results of the software safety validation; the tests should show that all the specified requirements for software requirements are correctly performed and the software system doesn’t preform unintended functions; the documentated results should state either that the software has passed the validation or the reason for its failure. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 30. Outline Introduction Objective Development of the overall safety requirements Functional Requirements Verification Non-functional requirements Further readings The objective of the requirements of this part is, to the extent required by the safety integrity level, to test and evaluate the outputs from a given software safety lifecycle phase to ensure correctness and consistency with respect to the outputs and standards provided as input to that phase. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 31. Outline Introduction Objective Development of the overall safety requirements Functional Requirements Verification Non-functional requirements Further readings the software verification planning must refer to criteria, techniques and tools addressing 1 the evaluation of the safety integrity requirements; 2 the section and documentation of verifiaction strategies, activities and techniques; 3 the selection and utilisation of verification tools; 4 the evaluation of verification results; 5 the corrective actions to be taken. after specifying the software safety requirements, verification must 1 consider whether the specified requirements adequately fulfil the requirements for functionality, safety integrity and any other requirements for safety planning; 2 consider whether the software safety validation planning adequately fulfils the specified software requirements. 3 check for incompatibilies between the specified safety requirements and the software validation planning. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 32. Outline Introduction Objective Development of the overall safety requirements Functional Requirements Verification Non-functional requirements Further readings after specifying the software system design, verification must 1 consider whether the specified tests for integrtion adequately fulfil the specified software system design; 2 consider whether the attributes of each major component of the specified software system design are adequate with respect to - feasability for further verification - testability for further verification - readability by the development and verification team - safe modificiation to permit further evolution 3 check for incompatibilies between the description of the software system design and the specified tests of the software system integration; Vittorio Giovara Software Requirements for Safety-Related Systems
  • 33. Outline Introduction Objective Development of the overall safety requirements Functional Requirements Verification Non-functional requirements Further readings the verification of software must be planned concurrently with the development for each pahse of the software safety lifecycle and this infomration shall be documented; the verification activities must include: 1 verification of software safety requirements; 2 verification of software architecture; 3 verification of software system design; 4 verification of software module design; 5 verification of code; 6 data verification; 7 software module testing; 8 software integration testing; 9 programmable electronics integration testing; 10 software safety requirements testsing (validation). Vittorio Giovara Software Requirements for Safety-Related Systems
  • 34. Outline Introduction Objective Development of the overall safety requirements Functional Requirements Verification Non-functional requirements Further readings evidence should be documented to show that the phase being verified has completely been satisfied; all essential information from each phase of the software safety lifcycle need for execution of the following phase should be available and verofied; outputs include: 1 adequacy of the specification, design description or code in the current phase for: - functionality - safety integrity - performance - readability by the development team - testability for further verification - safe modificiation to permit further evolution 2 adequacy of the validation planning and/or tests specified for the current phase; 3 check for incompatibilies between the tests specified in the current and the previouse phase and the outputs within the current phase. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 35. Outline Introduction Objective Development of the overall safety requirements Functional Requirements Verification Non-functional requirements Further readings after each verification, the correspondent documentation should include: 1 identification of items to be verified; 2 identification of the information against which the verification has been done; 3 non conformances. the source code should be verified by static methods to ensure conformance to the specified design of the software module, the requred coding standards and the requirements of safety planning. Vittorio Giovara Software Requirements for Safety-Related Systems
  • 36. Outline Introduction Development of the overall safety requirements Verification Further readings Please see as reference http://www.iec.ch/ http://en.wikipedia.org/wiki/Standards_ organization International Standard, IEC 61508, Functional safety of electrical/electronic/programmable electronic safety-related systems, Part 3, First edition, 1998 Original document localized at http://www.scribd.com/people/view/59403 Vittorio Giovara Software Requirements for Safety-Related Systems