메뉴 건너뛰기




Volumn 4615 LNCS, Issue , 2007, Pages 383-408

Towards evidence-based architectural design for safety-critical software applications

Author keywords

Design decisions; Software architecture; Software safety evidence

Indexed keywords

BAYESIAN NETWORKS; COMPUTER AIDED DESIGN; COMPUTER SIMULATION; PROBLEM SOLVING; SECURITY SYSTEMS; SYSTEMS ANALYSIS;

EID: 39149145169     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74035-3_17     Document Type: Conference Paper
Times cited : (8)

References (55)
  • 1
    • 39149091610 scopus 로고    scopus 로고
    • ARP 4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment, Society of Automotive Engineers, Inc. (1996)
    • ARP 4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment, Society of Automotive Engineers, Inc. (1996)
  • 2
    • 39149122407 scopus 로고    scopus 로고
    • Australian Defence Standard Def(Aust) 5679: Procurement of Computer-based Safety Critical Systems, Australian Department of Defence (1998)
    • Australian Defence Standard Def(Aust) 5679: Procurement of Computer-based Safety Critical Systems, Australian Department of Defence (1998)
  • 3
    • 0003615659 scopus 로고    scopus 로고
    • Functional Safety of Electrical/Electronic/Programmable Electronic SafetyRelated Systems
    • IEC 615038, International Electrotechnical Commission
    • IEC 615038 - Functional Safety of Electrical/Electronic/Programmable Electronic SafetyRelated Systems, International Electrotechnical Commission (1998)
    • (1998)
  • 5
    • 39149113694 scopus 로고    scopus 로고
    • RTCA/DO-178B: Software Considerations in Airborne Systems and Equipment Certification, Radio Technical Commission for Aeronautics (1992)
    • RTCA/DO-178B: Software Considerations in Airborne Systems and Equipment Certification, Radio Technical Commission for Aeronautics (1992)
  • 6
    • 39149121382 scopus 로고    scopus 로고
    • The United Modelling Language (UML) Specification
    • The United Modelling Language (UML) Specification. The Object Management Group (2005)
    • (2005) The Object Management Group
  • 8
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases: Use Cases with Hostile Intent
    • Alexander, I.: Misuse Cases: Use Cases with Hostile Intent. IEEE Software 20(1), 58-66
    • IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 18
    • 7744242790 scopus 로고    scopus 로고
    • Quantitative risk-based requirements reasoning
    • Feather, M.S., Comford, S.L.: Quantitative risk-based requirements reasoning. Requirements Engineering 8(4), 248-265
    • Requirements Engineering , vol.8 , Issue.4 , pp. 248-265
    • Feather, M.S.1    Comford, S.L.2
  • 26
    • 80455165383 scopus 로고    scopus 로고
    • Using Software Architecture Techniques to Support the Modular Certification of Safety-Critical Systems
    • Kelly, T.: Using Software Architecture Techniques to Support the Modular Certification of Safety-Critical Systems. In: Proceedings of Eleventh Australian Workshop on Safety-Related Programmable Systems (2006), http://www-users.cs. york.ac.uk/tpk/scs2006.pdf
    • (2006) Proceedings of Eleventh Australian Workshop on Safety-Related Programmable Systems
    • Kelly, T.1
  • 27
    • 39149099359 scopus 로고    scopus 로고
    • Safety, A Systematic Approach to Safety Case Management Department of Computer Science, DPhil Thesis, University of York, York
    • Kelly, T.P.: Arguing Safety - A Systematic Approach to Safety Case Management Department of Computer Science, DPhil Thesis, University of York, York (1999)
    • (1999) Arguing
    • Kelly, T.P.1
  • 29
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-Models
    • IEEE Computer Society, Los Alamitos
    • Lamsweerde, A.v.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proceedings of the 26th International Conference on Software Engineering, pp. 148-157. IEEE Computer Society, Los Alamitos (2004)
    • (2004) Proceedings of the 26th International Conference on Software Engineering , pp. 148-157
    • Lamsweerde, A.V.1
  • 32
    • 0031597192 scopus 로고    scopus 로고
    • Integrating Obstacles in Goal-Driven Requirements Engineering
    • Lamsweerde, A, ed, IEEE Computer Society Press, ACM Press, Los Alamitos
    • Lamsweerde, A.v., Letier, E.: Integrating Obstacles in Goal-Driven Requirements Engineering. In: Lamsweerde, A. (ed.) Proceedings of the 20th International Conference on Software Engineering, pp. 53-62. IEEE Computer Society Press / ACM Press, Los Alamitos (1998)
    • (1998) Proceedings of the 20th International Conference on Software Engineering , pp. 53-62
    • Lamsweerde, A.V.1    Letier, E.2
  • 34
    • 0033892694 scopus 로고    scopus 로고
    • Intent Specifications: An Approach to Building Human-Centered Specifications
    • Leveson, N.G.: Intent Specifications: An Approach to Building Human-Centered Specifications. IEEE Trans. on Software Engineering 26(1), 15-35
    • IEEE Trans. on Software Engineering , vol.26 , Issue.1 , pp. 15-35
    • Leveson, N.G.1
  • 39
    • 38149095960 scopus 로고    scopus 로고
    • Of Probabilistic Wp and SP-and Compositionality, London, Springer, Heidelberg
    • Morgan, C.: Of Probabilistic Wp and SP-and Compositionality. In: Symposium on the Occasion of 25 Years of CSP (London, 2004), pp. 220-241. Springer, Heidelberg (2004)
    • (2004) Symposium on the Occasion of 25 Years of CSP , pp. 220-241
    • Morgan, C.1
  • 40
    • 0026883734 scopus 로고    scopus 로고
    • Mylopoulos, J., Chung, L.: B.N. Representing and Using Non-Functional Requirements:A Process-Oriented Approach. IEEE Trans. on Software Engineering 18(6), 497-497
    • Mylopoulos, J., Chung, L.: B.N. Representing and Using Non-Functional Requirements:A Process-Oriented Approach. IEEE Trans. on Software Engineering 18(6), 497-497
  • 41
    • 85008523798 scopus 로고    scopus 로고
    • Weaving Together Requirements and Architectures
    • Nuseibeh, B.: Weaving Together Requirements and Architectures. IEEE Computer 34(3), 115-114
    • IEEE Computer , vol.34 , Issue.3 , pp. 115-114
    • Nuseibeh, B.1
  • 43
    • 0022667615 scopus 로고    scopus 로고
    • P.C.A: Rational design process: How and why to fake it
    • Pamas, D.L., Clements, P.C.A: rational design process: How and why to fake it. IEEE Trans. on Software Engineering 12(2), 251-257
    • IEEE Trans. on Software Engineering , vol.12 , Issue.2 , pp. 251-257
    • Pamas, D.L.1    Clements2
  • 45
    • 0028401161 scopus 로고    scopus 로고
    • Inquiry-based Requirements Analysis
    • Potts, C., Antón, A.I.: Inquiry-based Requirements Analysis. IEEE Software. 21-32.
    • IEEE Software , pp. 21-32
    • Potts, C.1    Antón, A.I.2
  • 46
    • 0026882989 scopus 로고    scopus 로고
    • Supporting systems development by capturing deliberations during requirements engineering
    • Ramesh, B., Dhar, V.: Supporting systems development by capturing deliberations during requirements engineering. IEEE Trans. on Software Engineering 18(6), 498-510
    • IEEE Trans. on Software Engineering , vol.18 , Issue.6 , pp. 498-510
    • Ramesh, B.1    Dhar, V.2
  • 47
    • 0004223940 scopus 로고
    • Cambridge University Press, Cambridge
    • Reason, J.: Human Error. Cambridge University Press, Cambridge (1990)
    • (1990) Human Error
    • Reason, J.1
  • 50
    • 39149084272 scopus 로고    scopus 로고
    • The SERENE Partners: CSR, E., ERA, OT, TUV. The SERENE Method Manual SafEty and Risk Evaluation using bayesian NEts: SERENE, ERA Technology Ltd. (1999)
    • The SERENE Partners: CSR, E., ERA, OT, TUV. The SERENE Method Manual SafEty and Risk Evaluation using bayesian NEts: SERENE, ERA Technology Ltd. (1999)
  • 52
    • 39149121041 scopus 로고    scopus 로고
    • Deriving Safety Requirements as Part of System Architecture Definition
    • System Safety Society
    • Wu, W., Kelly, T.: Deriving Safety Requirements as Part of System Architecture Definition. In: Proceedings of 24th International System Safety Conference, System Safety Society (2006)
    • (2006) Proceedings of 24th International System Safety Conference
    • Wu, W.1    Kelly, T.2
  • 53
    • 77049109148 scopus 로고    scopus 로고
    • Failure Modelling in Software Architecture Design for Safety
    • Wu, W., Kelly, T.: Failure Modelling in Software Architecture Design for Safety. SIGSOFT Softw. Eng. Notes 30(4), 1-7
    • SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-7
    • Wu, W.1    Kelly, T.2
  • 55
    • 18744362719 scopus 로고    scopus 로고
    • Wu, W, Kelly, T, Safety Tactics for Software Architecture Design. In: Proceedings of the 28th International Computer Software and Applications Conference, IEEE Computer Society, Los Alamitos 2004
    • Wu, W., Kelly, T.: Safety Tactics for Software Architecture Design. In: Proceedings of the 28th International Computer Software and Applications Conference, IEEE Computer Society, Los Alamitos (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.