skip to main content
research-article

Conditional Safety Certification of Open Adaptive Systems

Published:01 July 2013Publication History
Skip Abstract Section

Abstract

In recent years it has become more and more evident that openness and adaptivity are key characteristics of next-generation distributed systems. The reason for this is not least due to the advent of computing trends like ubiquitous computing, ambient intelligence, and cyber-physical systems, where systems are usually open for dynamic integration and able to react adaptively to changing situations. Despite being open and adaptive, it is a common requirement for such systems to be safe. However, traditional safety assurance techniques, both state-of-the-practice and state-of-the-art ones, are not sufficient in this context. We have recently developed some initial solution concepts based on conditional safety certificates and corresponding runtime analyses. In this article we show how to operationalize these concepts. To this end, we present in detail how to specify conditional safety certificates, how to transform them into suitable runtime models, and how these models finally support dynamic safety evaluations.

References

  1. Akers, S. B. 1978. Binary decision diagrams. IEEE Trans. Comput. C-27, 6, 509--516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Althammer, E., Schoitsch, E., Eriksson, H., and Vinter, J. 2009. The decos concept of generic safety cases - A step towards modular certification. In Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications. 537--545. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Avižienis, A., Laprie, J., Randell, B., and Landwehr, C. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Depend. Secur. Comput. 1, 11--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bell, M. 2008. Introduction to service-oriented modeling. In Service-Oriented Modeling: Service Analysis, Design, and Architecture, Wiley & Sons.Google ScholarGoogle Scholar
  5. Bencomo, N. 2009. On the use of software models during software execution. In Proceedings of the Workshop on Modeling in Software Engineering (MISE’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bryant, R. E. 1986. Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. C-35, 8, 677--691. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bryant, R. E. 1995. Binary decision diagrams and beyond: Enabeling techniques for formal verification. In Proceedings of the International Conference on Computer Automated Design. 236--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Continua Alliance. http://www.continuaalliance.org/index.html.Google ScholarGoogle Scholar
  9. DO-178C. 2012. Software considerations in airborne systems and equipment certification. Radio Technical Commision for Aeronautics (RTCA) SC-205, European Organisation for Civil Aviation Equipment (EUROCAE) WG-12.Google ScholarGoogle Scholar
  10. Domis, D. and Trapp, M. 2008. Integrating safety analyses and component-based design. In Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP’08). M. D. Harrison and M.-A. Sujan Eds., Lecture Notes in Computer Science, vol. 5219, Springer, 58--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fenelon, P. McDermid, J. A., Nicolson, M., and Pumfrey, D. J. 1994. Towards integrated safety analysis and design. ACM Appl. Comput. Rev. 2, 1, 21--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Fenn, J., Hawkins, R., Kelly, T. P., and Williams, P. 2007. Safety case composition using contracts -- Refinements based on feedback from an industrial case study. In Proceedings of the 15th Safety Critical Systems Symposium.Google ScholarGoogle Scholar
  13. Floch, J., Hallsteinsen, S., Stav, E., Eliassen, F., Lund, K., and Gjorven, E. 2006. Using architecture models for runtime adaptability. IEEE Softw. 23, 62--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Giese, H. and Hirsch, M. 2005. Modular verification of safe online-reconfiguration for proactive components in mechatronic uml. In Proceedings of the MoDELS Conference (Satellite Events). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Goldsby, H. J., Cheng, B. H., and Zhang, J. 2008. AMOEBA-rt: Run-time verification of adaptive software. In Proceedings of the Models in Software Engineering, Workshop and Symposia (MoDELS’07). H. Giese Ed., Lecture Notes in Computer Science, vol. 5002, Springer, 212--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hawkins, R. and McDermid, J. A. 2002. Performing hazard and safety analysis of object oriented systems. In Proceedings of the International System Safety Conference (ISSC’02).Google ScholarGoogle Scholar
  17. IEC 61508. 1999. Functional safety of electrical/electronic/programmable electronic safety related systems. International Electrotechnical Commission. http://www.iec.ch/functionalsafety/.Google ScholarGoogle Scholar
  18. IEC 62304. 2006. Medical device software -- Software life cycle processes. http://www.iso.org/iso/catalogue_detail.htm?csnumber=3 8421.Google ScholarGoogle Scholar
  19. Inverardi, P., Pelliccione, P., and Tivoli, M. 2009. Towards an assume-guarantee theory for adaptable systems. In Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS’09). 106--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. ISO26262. 2011. Road vehicles, functional safety part 6: Product development at the software level. http://www.iso.org/iso/catalogue_detail?csnumber=51362.Google ScholarGoogle Scholar
  21. Kaiser, B, Liggesmeyer, P., and Mäckel, O. 2004. A new component concept for fault trees. In Proceedings of the Conferences in Research and Practice in Information Technology. Vol. 33, P. Lindsay and T. Cant Eds., Australian Computer Society, 37--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kelly, T. P. 2001. Concepts and principles of compositional safety case construction. COMSA/2001/1/1, Res. rep. commissioned by QinetiQ. http://www-users.cs.york.ac.uk/tpk/CompositionalSafetyCases.pdf.Google ScholarGoogle Scholar
  23. Kelly, T. P. and Weaver, R. 2004. The goal structuring notation -- A safety argument notation. In Proceedings of the DSN Workshop on Assurance Cases: Best Practices, Possible Outcomes, and Future Opportunities.Google ScholarGoogle Scholar
  24. Lenzini, G., Tokmakoff, A., and Muskens, J. 2007. Managing trustworthiness in component-based embedded systems. Electron. Notes Theor. Comput. Sci. 179, 143--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lisagor, O., McDermid, J. A., and Pumfrey, D. J. 2006. Towards a practicable process for automated safety analysis. In Proceedings of the 24th International System Safety Conference. 596--607.Google ScholarGoogle Scholar
  26. Maenad. 2013. Is an FP7 project funded by the European Commission. http://www.maenad.eu.Google ScholarGoogle Scholar
  27. MagicDraw. 2013. Homepage: http://www.magicdraw.com/.Google ScholarGoogle Scholar
  28. Morin, B., Barais, O., Jezequel, J.-M., Fleurey, F., and Solberg, A. 2009. Models@Run. Time to support dynamic adaptation. IEEE Comput. 42, 10, 44--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Muskens, J. and Chaudron, M. 2004. Integrity management in component based systems. In Proceedings of the 30th EUROMICRO Conference (EUROMICRO’04). 611--619. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Papadopoulos, Y. and McDermid, J. 1999. Hierarchically performed hazard origin and propagation studies. In Proceedings of the 18th International Conference on Computer Safety, Reliability and Security. Lecture Notes in Computer Science, vol. 1608, Springer. 139--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Peper, C. and Schneider, D. 2008. Component engineering for adaptive ad-hoc systems. In Proceedings of the 30th International Conference on Software Engineering (ICSE’08). SEAMS Workshop. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Rushby, J. 2002. Modular certification. NASA contractor rep. CR-2002-212130, NASA Langley Research Center.Google ScholarGoogle Scholar
  33. Rushby J. 2007. Just-in-time certification. In Proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS’07). 15--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Rushby, J. 2008. Runtime certification. In Proceedings of the 8th Workshop on Runtime Verification (RV’08). Lecture Notes in Computer Science, vol. 5289, Springer, 21--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. SAE ARP 4761. 1996. Guidelines and methods for conducting the safety assessment process on civil airborne systems and equipment. Society of Automotive Engineers. http://standards.sae.org/arp4761/.Google ScholarGoogle Scholar
  36. Schneider, D. and Trapp, M. 2009. Runtime safety models in open systems of systems. In Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. 455--460. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Schneider, D. and Trapp, M. 2010. Conditional safety certificates in open systems. In Proceedings of the 1st Workshop on Critical Automotive Applications: Robustness and Safety (CARS’10). ACM Press, New York, 57--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Schneider, D. and Trapp, M. 2011. A safety engineering framework for open adaptive systems. In Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Schneider, D., Becker, M., and Trapp, M. 2011. Approaching runtime trust assurance in open adaptive systems. In Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS’11). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Shelton, C. P., Koopman, P., and Nace, W. 2003. A framework for scalable analysis and design of system-wide graceful degradation in distributed embedded systems. In Proceedings of the Workshop on Reliability in Embedded Systems.Google ScholarGoogle Scholar
  41. Su, R., Chaudron, M. R. V., and Lukkien, J. J. 2007. Adaptive runtime fault management for service instances in component-based software applications. IET Softw. 1, 1, 18--28.Google ScholarGoogle ScholarCross RefCross Ref
  42. Trapp, M. Adler, R. Förster, M., and Junger, J. 2007. Runtime adaptation in safety-critical automotive systems. In Proceedings of the IASTED International Conference on Software Engineering (SE’07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Vogel, T. and Giese, H. 2010. Adaptation and abstract runtime models. In Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS’10). ACM Press, New York, 39--48. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Conditional Safety Certification of Open Adaptive Systems

            Recommendations

            Reviews

            M. Mosbah

            Safety is an important issue in the use of computer systems, and particularly in safety-critical applications. However, it is generally investigated in static systems, and therefore the resulting solutions do not function as well in the face of dynamic changes. This paper deals with conditional safety certificates, and their effectiveness at runtime in open adaptive systems. The main problem to overcome is that safety is not modular, although it integrates many components. Additional preconditions are necessary to guarantee safety. To illustrate their approach, the authors present a few solutions, together with examples and case studies. The approach is similar to programming by contracts. The problem investigated in this paper is at the intersection of two different research communities: the adaptive systems community and the safety engineering community. It will be interesting to see how this approach matures, which it will have to do to be accepted and used by certification experts. Online Computing Reviews Service

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Autonomous and Adaptive Systems
              ACM Transactions on Autonomous and Adaptive Systems  Volume 8, Issue 2
              July 2013
              123 pages
              ISSN:1556-4665
              EISSN:1556-4703
              DOI:10.1145/2491465
              Issue’s Table of Contents

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 July 2013
              • Accepted: 1 October 2012
              • Revised: 1 September 2012
              • Received: 1 March 2012
              Published in taas Volume 8, Issue 2

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader