This paper describes safety analysis tools that have been developed for state-based requirements specification language called Reuirements State Machine Language (RSML). These tools include a simultor that allows for forward and backward execution os RSML specifications, a fault tree generator that is based on backward simulation, tools to check for consistency and completeness of specifications, and additional safety analysis techniques. AN example requirements specification for an Automated Highway System (AHS) is used for describing the functionality of the tools.
Standard safety analysis techniques are often ineffective when computers and digital devices are integrated into plant control. The “Safeware” methodologyand its set of supporting safety analysis techniques (and prototype tools) includes modeling and hazard analysis of complex systems where components may be a mixture of humans, hardware and software. This paper describes one of the Safeware hazard analysis techniques, Software deviation analysis, that incorporates beneficial features such as HAZOPS (such as guidewords, deviations, exploratory analysis, and a systems engineering approach) into an automated procedure that is capable of hadling the complexity and logical nature of computer software.
This paper describes the methods fro automatically analyzing formal, state-based requiements specifications for some aspects of completeness and consistency. The approach uses a low level functional formalism, simplifying the analysis process. State-space explosion problems are eliminated by applying the analysis at a high level of abstraction; i.e. instead of generating a reachability graph for analysis, th analysis is performed directly on the model. The method scales up to large scale systems by decompsing the specification into smaller, analyzable parts and then using functional composition rules to ensure that verifiable properties hold for the entire specification. The analysis algorithms and tools have been validated on a TCAS II, a complex, air-borne, collision avoidance system required on all commercial aircraft with more than 30 passengers that fly in US airspace.
The heterogeneity , increasing size and complexity fo distributed systems requires new architectures, strategies and tools for their technical management. In this paper we propose a policy based approach to distributed systems management. The use of different abstraction levels allows stepwise refinement from an informal strategic level to a formalized operation level. On the lowet level we use a formal language for separate definition of policies and events, that enables the computer to check the syntax of a given policy description and translate policies into executable rules. To increase the capability for reasoning on a given set of policies. we extended the architecture by a graph model of the process sematics of operational policy and event specifications. The graph model is supported by a compiler mapping operational specifications into their semantic graphs, and performing analysis and manipulation on such graphs.