Filters








33 Hits in 4.7 sec

Querying Automotive System Models and Safety Artifacts: Tool Support and Case Study

Alessio Di Sandro, Sahar Kokaly, Rick Salay, Marsha Chechik
2020 Journal of Automotive Software Engineering  
approach and show how queries can help achieve compliance with the ISO 26262 standard.  ...  In this paper, we define generic requirements for querying megamodels and demonstrate how to run queries in our Model Management INTeractive (MMINT) framework using the Viatra query engine.  ...  We would like to thank Gehan Selim and our collaborators at the McMaster Center for Software Certification for useful discussions.  ... 
doi:10.2991/jase.d.200912.001 fatcat:vs5ktnkwprgcra2jdzlcjvfbka

11.2.2 Reducing the Gap Between Formal and Informal Worlds in Automotive Safety-Critical Systems

HugoG. Chalé, Ofaina Taofifenua, Thierry Gaudré, Alexandra Topa, Nicole Lévy, Jean-Louis Boulanger
2011 INCOSE International Symposium  
This paper presents an overview of current initiatives at Renault dealing with the improvement of development processes for mechatronic systems to comply with ISO 26262.  ...  The ontology is at the heart of our improvement initiatives since it allows establishing logical consistency of the whole design process.  ...  As presented in (Chalé Góngora et al 2010) the ontology serves as a data model for the systems covered by the ISO 26262 standard.  ... 
doi:10.1002/j.2334-5837.2011.tb01287.x fatcat:kevlndubhzaz3o4uicikyyrna4

Managing Assurance Cases in Model Based Software Systems

Sahar Kokaly
2017 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)  
Although the main contributions of this thesis are not domain specific, for validation, we ground our approaches in the automotive domain and the ISO 26262 standard for functional safety of road vehicles  ...  For companies, compliance is a complex and costly goal to achieve and is often accomplished by producing socalled assurance cases, which demonstrate that the system indeed satisfies the property imposed  ...  In [Conrad et al.(2012) ], an artifact-centric compliance approach for ISO 26262 projects using model-based design is proposed.  ... 
doi:10.1109/icse-c.2017.44 dblp:conf/icse/Kokaly17 fatcat:bwtpzkmqrzhzpc4jm3lupevgmq

Continuous assessment of software traceability

Patrick Rempel, Patrick Mäder
2016 Proceedings of the 38th International Conference on Software Engineering Companion - ICSE '16  
[ ISO 26262-6:2011] .  ...  Relevant guidelines: ECSS-E-40, ISO 26262, DO-178B; Artifacts: 58 requirements, 9 designs, 6 test cases, 6 test results, 638 classes; Relevant trace links: 56.  ...  We ask for Your Opinion on our traceability compliance assessment technique based on your practical experience.  ... 
doi:10.1145/2889160.2892657 dblp:conf/icse/RempelM16 fatcat:d5nargsy5ffghixnfctt3uv52y

Grand Challenges of Traceability: The Next Ten Years [article]

Giuliano Antoniol and Jane Cleland-Huang and Jane Huffman Hayes and Michael Vierhauser
2017 arXiv   pre-print
Members of the research community are engaged in many active, ongoing, and impactful research projects.  ...  to be always present, built into the engineering process, and for it to have "effectively disappeared without a trace".  ...  Acknowledgements This work was carried out within the SMILE project financed by Vinnova, FFI, Fordonsstrategisk forskning och innovation under the grant number: 2016-04255.  ... 
arXiv:1710.03129v1 fatcat:ch275tcxtjcshesoq2ubbyyomy

Security Assurance Cases – State of the Art of an Emerging Approach [article]

Mazen Mohamad and Jan-Philipp Steghöfer and Riccardo Scandariato
2020 arXiv   pre-print
Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system.  ...  After the successful adoption of assurance cases for safety, SACs are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing  ...  Creators Academic authors Industrial authors 3rd party experts Validators Academic authors Industrial authors 3rd party experts Acknowledgements This work is partially supported by the CASUS research project  ... 
arXiv:2003.14151v1 fatcat:czh7tt6ufncw7dxice2p5mvgby

Evolving Critical Systems

Mike Hinchey, Lorcan Coyle
2010 2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems  
Acknowledgments Tom Mens is supported by ARC project AUWB-08/12-UMH19, "Model-Driven Software Evolution," funded by the Ministère de la Communauté française-Direction genérale de l'Enseignement non obligatoire  ...  We thank Schloss Dagstuhl for hosting the perspectives workshop, and all the workshop participants whose discussions led to this special issue.  ...  If designs are represented as models in, for instance, UML, then transformation-based approaches could be useful. 1 Model-based, generative approaches offer an opportunity to facilitate evolution because  ... 
doi:10.1109/ecbs.2010.62 dblp:conf/ecbs/HincheyC10 fatcat:66zficpxqrbgldqt2igog67ade

Systems Challenges for Trustworthy Embodied Systems [article]

Harald Rueß
2022 arXiv   pre-print
We are therefore identifying a number of urgent systems challenges for trustworthy embodied systems, including robust and human-centric AI, cognitive architectures, uncertainty quantification, trustworthy  ...  context we face various engineering challenges, as it is crucial to coordinate the behavior of embodied systems in a beneficial manner, ensure their compatibility with our human-centered social values, and design  ...  Vazdanan et al., Responsibility Research for Trustworthy Autonomous Systems, 2021.27 For instance, industrial safety engineering standards such as DO 178C in aerospace and ISO 26262 in the automotive industry  ... 
arXiv:2201.03413v2 fatcat:hwprg3zjhvfuro3etecx2t4qua

Security assurance cases—state of the art of an emerging approach

Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato
2021 Empirical Software Engineering  
AbstractSecurity Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system.  ...  After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing  ...  Acknowledgements This work is partially supported by the CASUS research project funded by VINNOVA, a Swedish funding agency.  ... 
doi:10.1007/s10664-021-09971-7 fatcat:sxa6pbmpbjdrhbqmiyl25okkzq

Model-driven methods for developing ISO-certified safety-critical systems

Laurenz Gutleder, Christian Huemer
2020
This includes the development of a SysML profile, a use case, and a descriptive evaluation based on the requirements specified in the ISO 26262 series of standards.  ...  Different model-based methods are applied depending on their safety-critical domains and specific safety standards such as the ISO 26262 for functional safety of road vehicles rather than applying a set  ...  to demonstrate compliance of design model artifacts with software requirements.  ... 
doi:10.34726/hss.2020.71545 fatcat:x65pkpo3qjhwtoj6bb66jgvppe

Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile

Marco Mori, Andrea Ceccarelli, Paolo Lollini, Bernhard Frömel, Francesco Brancati, Andrea Bondavalli
2017 Journal of Software: Evolution and Process  
for SoS rapid modeling, validation, code-generation, and simulation.  ...  We show how to use the profile in a model-driven engineering process to support different types of analyses, and we discuss how to integrate the profile in a user-friendly model-driven engineering tool  ...  (see, for example, the IEC 61508, DO-178B, DO-254 and ISO 26262 standards)."  ... 
doi:10.1002/smr.1878 fatcat:mx4kxcdsxfdr7lkocsqcc72gie

Safe AI – How is this Possible? [article]

Harald Rueß, Simon Burton
2022 arXiv   pre-print
We outline some of underlying challenges of safe AI and suggest a rigorous engineering framework for minimizing uncertainty, thereby increasing confidence, up to tolerable levels, in the safe behavior  ...  These examples demonstrate that uncertainty is not only a design but also an essential runtime artifact for the situational generation of safe control behavior.  ...  Safe AI Seite 12 von 44 For all these reasons, well-established and successful safety standards for software-intensive systems, including DO 178C in aerospace and ISO 26262 in the automotive industry,  ... 
arXiv:2201.10436v2 fatcat:lu5ibn3qc5hormd4w6zjmszplq

Mils: Business, Legal And Social Acceptance

Christophe Toulemonde, Jacques Brygier, Holger Blasum, Sergey Tverdyshev, Bertrand Leconte, Kevin Müller, Axel Söding - Freiherr von Blomberg, Igor Furgel, Martina Truskaller
2015 Zenodo  
For that matter, we interviewed face to face the business partners of the project.  ...  During the project, we have performed the following tasks: We started the analysing by studying the business requirements and values for multiple independent levels of security in the core markets, defence  ...  ISO 26262 defines state-of the-art design processes for software development comparable to DO-178B in the avionics.  ... 
doi:10.5281/zenodo.47301 fatcat:2njeypzu4jfgjaygciloaj4zae

Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, January 06-11 2019, Schloss Dagstuhl [article]

Joel Greenyer, Malte Lochau, Thomas Vogel
2019 arXiv   pre-print
This report documents the program and results of the GI-Dagstuhl Seminar 19023 on Explainable Software for Cyber-Physical Systems (ES4CPS).  ...  The seminar was concerned with the challenge that for future Cyber-Physical Systems (CPS), it will become increasingly relevant to explain their behavior (past, current, and future behavior, why a certain  ...  Acknowledgments We would like to thank the Gesellschaft for Informatik e.V. (GI, German Society for Informatics) and Schloss Dagstuhl for partially funding this seminar.  ... 
arXiv:1904.11851v1 fatcat:r2r5ac6hmnel3f6weiynjwunni

An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study [chapter]

Annapurna Chunduri, Robert Feldt, Mikael Adenmark
2016 Lecture Notes in Computer Science  
Apart from interviews, data from relevant artifacts in databases and archived documents has been used to achieve data triangulation.  ...  Based on the research objectives, an interview questionnaire with open-ended and close-ended questions has been used.  ...  Added to this is the new dimension of challenges and complexity introduced by the need for compliance to the ISO 26262 safety standard in the near future [11] .  ... 
doi:10.1007/978-3-319-49094-6_15 fatcat:euacc4ynrbb4bi2ywuy62nydaa
« Previous Showing results 1 — 15 out of 33 results