• Title/Summary/Keyword: goal structure notation

Search Result 3, Processing Time 0.014 seconds

A Systematic Method for Independent Safety Assessment of Railway System by Applying NOR-STA Tool (NOR-STA 도구를 활용한 체계적 철도시스템 독립안전성 평가 방안)

  • Jung Kyou Um;Peom Park;Young Min Kim
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.29-38
    • /
    • 2023
  • Independent Safety Assessment (ISA) is a third-party assessment that is to confirm that the system satisfies the safety requirements in the defined operational context. The process of this assessment often brings about many complex arguments that should be supported by evidence and justification. The communication between arguments and evidence is of the most importance in the context of safety case. This study illustrates how NOR-STA can be used for ISA process, showing the effective structure of safety compliance. The study outlines the steps to breaks down the top goal into many elements such as arguments, sub-goals, justification, context and assumptions. It concludes that the evidence-based safety conformance process utilizing NOR-STA provides a more effective and systematic representation of the independent safety assessment process in conformance cases.

A Method to Specify and Verify Requirements for Safety Critical System (안전 필수 시스템을 위한 요구사항 명세 및 검증 방법)

  • Lim, Hye Sun;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.893-907
    • /
    • 2017
  • In safety-critical systems, software defects may have serious consequences. Therefore, defects should be considered during the requirements specification process, which is the first step of a software development lifecycle. Stakeholder requirements that are usually written in natural language are difficult to derived, and there may also be defects due to ambiguity and inaccuracy. To address these issues, we propose a requirement specification method using a standardized Boilerplate and a GSN Model. The Boilerplate is a semi-standard language that follows a predefined format. Due to its ability to provide a consistent representation of the requirements, boilerplate helps stakeholders avoid ambiguities about what they mean and to define the exact meaning of the requirement. Meanwhile, GSN is recognized notation to prepare a Safety Case to prove to authorities that a system is safe. It can be expressed as a functional goal, e.g., Safety Evidence, etc. The proposed study allows an analyst to easily identify a fault from the early stage of the software development lifecycle. The Boilerplate and GSN Model are designed to specify the requirements of safety critical systems and to prove safety conformity through a connection with Safety Evidence. In addition, the proposed approach is also useful to develop secure software by correcting deficiencies in the requirements found during this process.

A Transformation Technique for Constraints-preserving of XML Data (XML 데이터의 제약조건 보존을 위한 변환 기법)

  • Cho, Jung-Gil;Keum, Young-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.1-9
    • /
    • 2009
  • Many techniques have been proposed to store efficiently and query XML data. One way achieving this goal is using relational database by transforming XML data into relational format. But most researches only transformed content and structure of XML schema. Although they transformed semantic constrainment of XML schema, they did not all of semantics. In this paper, we propose a systematic technique for extracting semantic constrainment from XML schema and storing method when the extracting result is transformed into relational schema without any lost of semantic constrainment. The transforming algorithm is used for extracting and storing semantic constrainment from XML schema and it shows how extracted information is stored according to schema notation. Also it provides semantic knowledges that are needed to be confirmed during the transformation to ensure a correct relation schema. The technique can reduce storage redundancy and can keep up content and structure with integrity constraints.