An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification

被引:0
|
作者
Koo, SR
Seong, PH
Yoo, J
Cha, SD
Yoo, YJ
机构
[1] Korea Adv Inst Sci & Technol, Dept Nucl & Quantum Engn, Taejon 305701, South Korea
[2] Korea Adv Inst Sci & Technol, Div Comp Sci, Taejon 305701, South Korea
[3] Korea Adv Inst Sci & Technol, AITrc,SPIC, IIRTRC, Dept Elect Engn & Comp Sci, Taejon 305701, South Korea
[4] BNF Technol Inc, Taejon 305353, South Korea
关键词
software requirements analysis; V&V; safety-critical systems; inspection; traceability; formal method;
D O I
10.1016/j.ress.2004.08.024
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A thorough requirements analysis is indispensable for developing and implementing safety-critical software systems such as nuclear power plant (NPP) software systems because a single error in the requirements can generate serious software faults. However, it is very difficult to completely analyze system requirements. In this paper, an effective technique for the software requirements analysis is suggested. For requirements verification and validation (V&V) tasks, our technique uses software inspection, requirement traceability, and formal specification with structural decomposition. Software inspection and requirements traceability analysis are widely considered the most effective software V&V methods. Although formal methods are also considered an effective V&V activity, they are difficult to use properly in the nuclear fields as well as in other fields because of their mathematical nature. In this work, we propose an integrated environment (IE) approach for requirements, which is an integrated approach that enables easy inspection by combining requirement traceability and effective use of a formal method. The paper also introduces computer-aided tools for supporting IE approach for requirements. Called the nuclear software inspection support and requirements traceability (NuSISRT), the tool incorporates software inspection, requirement traceability, and formal specification capabilities. We designed the NuSISRT to partially automate software inspection and analysis of requirement traceability. In addition, for the formal specification and analysis, we used the formal requirements specification and analysis tool for nuclear engineering (NuSRS). (c) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:248 / 260
页数:13
相关论文
共 50 条
  • [31] Software requirements specification database based on requirements frame model
    Ohnishi, A
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, 1996, : 221 - 228
  • [32] Test-linked specification for safety-critical software
    Hecht, H
    Hecht, M
    THIRTIETH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL 5: ADVANCED TECHNOLOGY, 1997, : 267 - 272
  • [33] Translating Software Requirements from Natural Language to Formal Specification
    Fatwanto, Agung
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND CYBERNETICS (CYBERNETICSCOM), 2012, : 148 - 152
  • [34] A tool for the design and analysis of software safety-critical systems
    Gill, JA
    Ferguson, F
    INFORMATION REUSE AND INTEGRATION, 2001, : 127 - 132
  • [35] Software reliability analysis for safety-critical and control systems
    Kumar, Pramod
    Singh, Lalit Kumar
    Kumar, Chiranjeev
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2020, 36 (01) : 340 - 353
  • [36] A Framework for Software Safety in Safety-Critical Systems
    Medikonda, Ben Swarup
    Panchumarthy, Seetha Ramaiah
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 361 - 374
  • [37] From Rigorous Requirements Engineering to Formal System Design of Safety-Critical Systems
    Ponsard, Christophe
    Massonet, Philippe
    Dallons, Gautier
    ERCIM NEWS, 2008, (75): : 22 - 23
  • [38] THE ROLE OF FORMAL METHODS IN DEVELOPING SAFETY-CRITICAL SOFTWARE
    THOMAS, M
    MICROPROCESSORS AND MICROSYSTEMS, 1990, 14 (05) : 323 - 324
  • [39] Formal modeling of railway signal safety-critical software
    1600, ICIC Express Letters Office (10):
  • [40] Best practices in code inspection for safety-critical software
    de Almeida, JR
    Camargo, JB
    Basseto, BA
    Paz, SM
    IEEE SOFTWARE, 2003, 20 (03) : 56 - +