Abstract
This paper focuses on the approaches used in safety cases for software based systems. We outline the history of approaches for assuring the safety of software-based systems, the current uptake of safety and assurance cases and the current practice on structured safety cases. Directions for further development are discussed.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ACARD(1986) Software: a vital key to UK competitiveness. Advisory Council on Applied Research and Development. HMSO
ACSNI (1997) The use of computers in safety-critical applications. Final Report of the Study Group on the Safety of Operational Computer Systems (SOCS) constituted by the Advisory Committee on the Safety of Nuclear Installations. HSE Books, London
Bishop PG (ed) (1990) Dependability of critical computer systems 3. Elsevier Applied Science
Bishop PG, Bloomfield RE (1995) The SHIP safety case. In: Rabe G (ed) Proc SafeComp 95, 14th IFAC Conf on Computer Safety, Reliability and Security, Belgirate, Italy
Bishop PG, Bloomfield RE (1998) A methodology for safety case development. In: Redmill F, Anderson T (eds) Industrial perspectives of safety-critical systems. Springer-Verlag
Bishop PG, Bloomfield RE, Clement TP, Guerra ASL (2002a) Software criticality analysis of COTS/SOUP. SAFECOMP 2002, Catania, Italy
Bishop PG, Bloomfield RE, Froome PKD (2002b) Justifying the use of software of uncertain pedigree (SOUP) in safety related applications. 5th Int Symp Programmable Electronic Systems in Safety Related Applications, Cologne
Bloomfield RE (1990) SafeIT, the safety of programmable electronic systems: a government consultation document on activities to promote the safety of computer-controlled systems. Department of Trade and Industry
Bloomfield RE, Brazendale J (1990) SafeIT2, standards framework. Department of Trade and Industry
Bloomfield RE, Littlewood B (2003) Multi-legged arguments: the impact of diversity upon confidence in dependability arguments. Proc DSN 2003. IEEE Computer Society
Bloomfield RE, Littlewood B (2007) Confidence: its role in dependability cases for risk assessment. Intl Conf Dependable Systems and Networks, Edinburgh, IEEE Computer Society
Bloomfield RE, Bishop PG, Jones CCM, Froome PKD (1998) ASCAD – Adelard safety case development manual. Adelard
Bloomfield RE et al (2002) Safety cases for PES. Adelard. http://www.adelard.com/web/hnav/resources/iee_pn/index.html. Accessed 17 October 2009
Bloomfield RE, Guerra S, Miller A et al (2006) International Working Group on Assurance Cases (for Security). IEEE Secur Priv 4:66–68
Butler R, Finelli G (1993) The infeasibility of quantifying the reliability of life-critical real-time software. IEEE Trans Software Engineering 19:3–12
CAA (2009) CAP 670 Air traffic services safety requirements, SW01 regulatory objectives for software safety assurance. Civil Aviation Authority Safety Regulation Group
CEGB (1982) Sizewell B preconstruction safety report. Central Electricity Generating Board
Chinneck P, Pumfrey DJ, Kelly TP (2004) Turning up the HEAT on safety case construction. In: Redmill F, Anderson T (eds) Practical elements of safety. Springer-Verlag
Courtois PJ (2001) Semantic structures and logic properties of computer-based system dependability cases. Nucl Eng Des 203:87–106
Cullen (1990) The public inquiry into the piper alpha disaster. HMSO Cm 1310
Emmet L, Cleland G (2002) Graphical notations, narratives and persuasion: a pliant systems approach to hypertext tool design. In: Proc ACM Hypertext, College Park, Maryland, USA
Eurocontrol (2003) ESARR6 Software in ATM systems.
Eurocontrol (2006) Safety Case Development Manual. http://www.eurocontrol.int/cascade/gallery/content/public/documents/safetycasedevmanual.pdf. Accessed 17 October 2009
Fan Y, Kelly T (2004) Contract-based justification for COTS component within safety-critical applications. Proc 9th Australian workshop on safety critical systems and software, Brisbane
Gorski J (2004) Trust Case – a case for trustworthiness of it infrastructures. In Proc NATO Advanced Research Workshop on Cyberspace Security and Defence: Research Issues, Gdansk, Poland
Greenwell WS, Knight JC, Holloway CM, Pease J (2006) A taxonomy of fallacies in system safety argument. 24th International System Safety Conference, Albuequerque
HSE (1987) Programmable electronic systems in safety related applications. Health and Safety Executive
HSE (1993), Out of control – a compilation of incidents involving control systems. Health and Safety Executive (draft document)
IEC (1986) IEC 880 Software for computers in the safety systems of nuclear power stations. International Electrotechnical Commission
IEC (1993) Functional safety of electrical/electronic/programmable electronic systems: generic aspects. Part 1: General requirements. Draft standard from IEC Sub-Committee 65A: System Aspects, Working Group 10. International Electrotechnical Commission
IEC (1998) Functional safety of electrical, electronic, and programmable electronic safety related systems. IEC 61508, Parts 1 to 7, 1998 to 2000. International Electrotechnical Commission
IEE (1989) Software in safety related systems. The Institution of Electrical Engineers and the British Computer Society
Jackson D, Thomas M, Millett LI (eds) (2007) Software for dependable systems: sufficient evidence? Committee on Certifiably Dependable Software Systems, National Research Council
Jones C, Bloomfield RE, Froome PKD, Bishop PG (2001) Methods for assessing the safety integrity of safety-related software of uncertain pedigree (SOUP). HSE Contract Research Report CRR 337/2001. Health and Safety Executive
Kelly TP (1998) Arguing safety: a systematic approach to managing safety cases. PhD thesis, University of York
Kelly T, McDermid J (1997) Safety case construction and reuse using patterns. Proc 16th Conf on Computer Safety, Reliability and Security (Safecomp ’97)
Kelly TP, Weaver RA (2004) The goal structuring notation – a safety argument notation. Proc Dependable Systems and Networks Workshop on Assurance Cases
Lipson H (2008) Assurance cases overview. US Department of Homeland Security. https://buildsecurityin.us-cert.gov/daisy/bsi/articles/knowledge/assurance/641-BSI.html. Accessed 17 October 2009
Littlewood B (2000) The use of proofs in diversity arguments. IEEE Trans Softw Eng 26:1022–1023
Littlewood B, Strigini L (1993) Assessment of ultra-high dependability for software-based systems. Comm ACM 36:69–80
Littlewood B, Wright D (2007) The use of multi-legged arguments to increase confidence in safety claims for software-based systems: a study based on a BBN of an idealised example. IEEE Trans Softw Eng 33:347–365
McDermid JA (1994) Support for safety cases and safety argument using SAM. Reliab Eng Syst Saf 43:111–127
MoD (1989) Draft Interim Def-Stan 00-55, the procurement of safety critical software in defence equipment. Ministry of Defence
MoD (1991) Interim Def-Stan 00-56, hazard analysis and safety classification of the computer and programmable electronic system elements of defence equipment. Ministry of Defence
MoD (1997) Def Stan 00-42 Reliability and Maintainability (R&M) assurance guide, Part 2 Software. Ministry of Defence
MoD (2004) Def Stan 00-56 Safety management requirements for defence systems. Issue 3. Ministry of Defence
MoD (2008) Def Stan 00-42 Reliability and Maintainability (R&M) assurance guide, Part 3 R&M Case. Ministry of Defence
Redmill F (ed) (1988) Dependability of critical computer systems 1. Elsevier Applied Science
Redmill F (ed) (1989) Dependability of critical computer systems 2. Elsevier Applied Science
Robens (1972) Safety and health at work. Report of the committee 1970-72. HMSO Cmnd 5034
Smith PR, Stockham R (2007) EMPHASIS – An assessment tool for smart instruments, PRfsS/Moore Industries-Europe, United Kingdom
Toulmin SE (1958) The uses of argument. Cambridge University Press
Virginia (2009) Safety cases repository. University of Virginia Dependability Research Group. http://dependability.cs.virginia.edu/info/Safety_Cases:Repository. Accessed 17 October 2009
Acknowledgments
The authors wish to acknowledge the support given by the UK Control and Instrumentation Nuclear Industry Forum (CINIF) research programme, the UK Health and Safety Executive research programme, the EU Environment programme (sub-theme Major Industrial Hazards) and the EU nuclear research programme who funded some of the research presented in this paper.
Disclaimer The views expressed in this paper are those of the authors and do not necessarily represent the views of the research sponsors.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag London
About this paper
Cite this paper
Bloomfield, R., Bishop, P. (2010). Safety and Assurance Cases: Past, Present and Possible Future – an Adelard Perspective. In: Dale, C., Anderson, T. (eds) Making Systems Safer. Springer, London. https://doi.org/10.1007/978-1-84996-086-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-84996-086-1_4
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-085-4
Online ISBN: 978-1-84996-086-1
eBook Packages: Computer ScienceComputer Science (R0)