Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Automated Model-Based Assurance Case Management Using Constrained Natural Language

Published: 08 August 2023 Publication History

Abstract

Assurance cases are used to communicate and assess confidence in critical system properties, e.g., safety and security. Historically, assurance cases have been manually created documents, validated by engineers through lengthy and error-prone processes. Recently, system assurance practitioners have begun adopting model-based approaches to improve the efficiency and quality of system assurance activities. This becomes increasingly important, for example, to ensure the safety of robotics and autonomous systems (RASs), as they are adopted into society. Such systems can be highly complex, and so it is a challenge to manage the development life-cycle and improve efficiency, including coordination of validation activities, and change impact analysis in interconnected system assurance artifacts. However, adopting model-based approaches require skills in the model management languages, which system assurance practitioners may not be acquainted with. In this article, we contribute an automated validation framework for the model-based assurance cases, which promotes the usage of a constrained natural language (CNL), that can be automatically transformed and executed against engineering models involved in assurance case development. We apply our approach to a case study based on an autonomous underwater vehicle (AUV).

References

[1]
European Organisation for the Safety of Air Navigation: Safety Case Development Manual, Eurocontrol, Brussels, Belgium, 2006.
[2]
International Atomic Energy Agency Safety Glossary: Terminology Used in Nuclear Safety and Radiation Protection, IAEA, Vienna, Austria, 2008.
[3]
Road Vehicles—Functional Safety, ISO Standard, 2018.
[4]
Engineering Safety Management Issue 4, U.K. Rail Safety Stand. Board, London, U.K., 2007.
[5]
Safety Management Requirements for Defence Systems, U.K. Ministry Defence, London, U.K., 2007.
[6]
M. Trapp, D. Schneider, and P. Liggesmeyer, “A safety roadmap to cyber-physical systems,” in Perspectives on the Future of Software Engineering. Heidelberg, Germany: Springer, 2013, pp. 81–94.
[7]
T. Kelly and R. Weaver, “The goal structuring notation—A safety argument notation,” in Proc. Dependable Syst. Netw. Workshop Assurance Cases, 2004, pp. 1–6.
[8]
P. Bishop and R. Bloomfield, “A methodology for safety case development,” in Industrial Perspectives of Safety-Critical Systems. London, U.K.: Springer, 2000.
[9]
R. Wei, T. P. Kelly, X. Dai, S. Zhao, and R. Hawkins, “Model based system assurance using the structured assurance case metamodel,” J. Syst. Softw., vol. 154, pp. 211–233, Aug. 2019.
[10]
E. Denney and G. Pai, “Tool support for assurance case development,” Autom. Softw. Eng., vol. 25, pp. 435–499, Dec. 2018.
[11]
R. D. Hawkins, I. Habli, and T. Kelly, “The need for a weaving model in assurance case automation,” Ada User J., vol. 36, no. 3, pp. 187–191, 2015.
[12]
R. Hawkins, I. Habli, D. Kolovos, R. Paige, and T. Kelly, “Weaving an assurance case from design: A model-based approach,” in Proc. IEEE 16th Int. Symp. High Assurance Syst. Eng. (HASE), 2015, pp. 110–117.
[13]
Z. Jianget al., “Bridging the pragmatic gaps for mixed-criticality systems in the automotive industry,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 41, no. 4, pp. 1116–1129, Apr. 2022.
[14]
Z. Jianget al., “Re-thinking mixed-criticality architecture for automotive industry,” in Proc. IEEE 38th Int. Conf. Comput. Design (ICCD), 2020, pp. 510–517.
[15]
Z. Jiang, N. C. Audsley, and P. Dong, “BlueVisor: A scalable real-time hardware hypervisor for many-core embedded systems,” in Proc. IEEE Real-Time Embedded Technol. Appl. Symp. (RTAS), 2018, pp. 75–84.
[16]
S. A. Seshia, S. Hu, W. Li, and Q. Zhu, “Design automation of cyber-physical systems: Challenges, advances, and opportunities,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 36, no. 9, pp. 1421–1434, Sep. 2017.
[17]
R. Wei, T. P. Kelly, R. Hawkins, and E. Armengaud, “DEIS: Dependability engineering innovation for cyber-physical systems,” In Federation of International Conferences on Software Technologies: Applications and Foundations. Cham, Switzerland: Springer, 2017, pp. 409–416.
[18]
R. Wei, J. Reich, T. Kelly, and S. Gerasimou, “On the transition from design time to runtime model-based assurance cases,” in Proc. 13th Int. Workshop Models@Runtime, ACM/IEEE 21st Int. Conf. Model Driven Eng. Lang. Syst. (MoDELS), 2018, pp. 1–6.
[19]
E. Asaadi, E. Denney, J. Menzies, G. J. Pai, and D. Petroff, “Dynamic assurance cases: A pathway to trusted autonomy,” Computer, vol. 53, no. 12, pp. 35–46, 2020.
[20]
Structured assurance case metamodel.” Object Management Group. 2019. Accessed: Jun. 6, 2020. [Online]. Available: https://www.omg.org/spec/SACM
[21]
R. Wei, Z. Jiang, X. Guo, H. Mei, A. Zolotas, and T. Kelly, “Designing critical systems with iterative automated safety analysis,” in Proc. 59th ACM/IEEE Design Autom. Conf., 2022, pp. 181–186.
[22]
D. Steinberg, F. Budinsky, E. Merks, and M. Paternostro, EMF: Eclipse Modeling Framework. Hoboken, NJ, USA: Pearson Educ., 2008.
[23]
Eclipse modelling framework (GMF).” Eclipse Foundation. 2020. [Online]. Available: https://www.eclipse.org/modeling/gmp/
[24]
D. S. Kolovos, R. F. Paige, and F. A. C. Polack, “The Epsilon transformation language,” in Proc. Int. Conf. Theory Pract. Model Transf., 2008, pp. 46–60.
[25]
L. Bettini, Implementing Domain-Specific Languages With Xtext and Xtend. Birmingham, U.K.: Packt Publ., 2016.
[26]
P. B. F. Njonko, S. Cardey, P. Greenfield, and W. El Abed, “RuleCNL: A controlled natural language for business rule specifications,” in Proc. Int. Workshop Controlled Nat. Lang., 2014, pp. 66–77.
[27]
K. Barmpis, D. Kolovos, and J. Hingorani, “Towards a framework for writing executable natural language rules,” in Proc. Eur. Conf. Model. Found. Appl., 2018, pp. 251–263.
[28]
D. S. Kolovos, R. F. Paige, and F. A. C. Polack, “On the evolution of OCL for capturing structural constraints in modelling languages,” in Rigorous Methods for Software Construction and Analysis. Heidelberg, Germany: Springer, 2009, pp. 204–218.
[29]
L. M. Rose, R. F. Paige, D. S. Kolovos, and F. A. C. Polack, “The Epsilon generation language,” in Proc. Eur. Conf. Model Driven Archit. Found. Appl., 2008, pp. 1–16.
[30]
A. Miyazawa, P. Ribeiro, W. Li, A. Cavalcanti, J. Timmis, and J. Woodcock, “RoboChart: A state-machine notation for modelling and verification of mobile and autonomous robots,” Dept. Comput. Sci., Univ. York, York, U.K., Rep. MRLCTW16, 2016.
[31]
K. Netkachova, O. Netkachov, and R. Bloomfield, “Tool support for assurance case building blocks,” in Proc. Int. Conf. Comput. Safety, Rel., Security, 2014, pp. 62–71.
[32]
M. R. Barry, “CertWare: A workbench for safety case production and analysis,” in Proc. IEEE Aerosp. Conf., 2011, pp. 1–10.
[33]
J. Rushby, “An evidential tool bus,” in Formal Methods and Software Engineering (Lecture Notes in Computer Science 3785). Heidelberg, Germany: Springer, 2005.
[34]
S. Cruanes, G. Hamon, S. Owre, and N. Shankar, “Tool integration with the evidential tool bus,” in Verification, Model Checking, and Abstract Interpretation (Lecture Notes in Computer Science 7737). Heidelberg, Germany: Springer, 2013, pp. 275–294.
[35]
M. Gleirscher, S. Foster, and Y. Nemouchi, “Evolution of formal modelbased assurance cases for autonomous robots,” in Proc. 17th Int. Conf. Softw. Eng. Formal Methods, 2019, pp. 87–104.
[36]
G. Aiello, R. D. Bernardo, M. Maggio, D. D. Bona, and G. L. Re, “Inferring business rules from natural language expressions,” in Proc. IEEE 7th Int. Conf. Service Oriented Comput. Appl., 2014, pp. 131–136.

Recommendations

Comments

Information & Contributors

Information

Published In

Publisher

IEEE Press

Publication History

Published: 08 August 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media