LPIS Home Page
Google Search

Title: Towards Compositional Safety Analysis via Semantic Representation of Component Failure Behaviour
Author(s): K. Mokos, P. Katsaros, N. Bassiliades, V. Vassiliadis, M. Perrotin.
Keywords: Ontology, Model Driven Software Development, Dependability, Safety Analysis.
Appeared in: Proc. 8th Joint Conference on Knowledge - Based Software Engineering 2008 (JCKBSE 08), M. Virvou and T. Nakamura (Eds.), IOS Press, pp. 405-414, August 2008, Piraeus, Greece, 2008.
Abstract: In dependable systems engineering safety assessment of complex designs that involve software and hardware components is one of the most difficult tasks required. Due to the different modelling languages and models that are used for complementary tasks, the model and specification artefacts are not easily shared by the experts involved in the design process. Moreover, the structural and semantic differences of the used language representations open a possibility for inconsistencies between the corresponding models. This work explores the role of an ontology representation of component failure behaviour as a basis for automated model transformations, as well as a library of reusable knowledge artefacts to be used in different modelling languages and models. The presented approach was motivated by recent findings and requirements derived from European industrial-driven research and development projects.
See also :

        This paper has been cited by the following:

1 Lars Grunske and Jun Han, "A Comparative Study into Architecture-Based Safety Evaluation Methodologies using AADLs Error Annex and Failure Propagation Models", 11th IEEE High Assurance Systems Engineering Symposium, Nanjing, China, December 3 - 5, 2008.
2 Jose Ignacio Aizpurua Unanue, Enaut Muxika Olasagasti, Design of Dependable Systems: An Overview of Analysis and Verification Approaches, Proc. Of Fifth International Conference on Dependability, DEPEND 2012, pp. 4 12.
3 Jose Ignacio Aizpurua, Eñaut Muxika, Model-Based Design of Dependable Systems: Limitations and Evolution of Analysis and Verification Approaches, International Journal on Advances in Security, volume 6, numbers 1 and 2, 2013, pp. 12-31