Abstract
Critical systems must be shown to be acceptably safe to deploy and use in their environment. The size, scale, heterogeneity, and distributed nature of these increasingly complex systems makes them difficult to verify and analyse. Additionally, domain experts use a variety of languages to model and build their systems. We present an automated safety analysis technique, Fault Propagation and Transformation Analysis, and explain how it can be used for automatically calculating the failure behaviour of an entire system from the failure behaviours of its components. We outline an implementation of the technique in the Epsilon model management platform, allowing it to be used with state-of-the-art model management languages and tools, and making it applicable to a variety of different domain-specific modelling languages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Conmy, P., Paige, R.: Challenges when using Model-Driven Architecture in the development of safety critical software. In: Proceedings of 4th Workshop on Model-Based Methodologies for Pervasive and Embedded Software. IEEE Computer Society Press, Los Alamitos (2007)
Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Systems Journal 45(3), 621–646 (2006)
Efftinge, S.: xText reference document (2007), www.eclipse.org/gmt/oaw
Fenelon, P., McDermid, J.A.: An integrated toolset for software safety analysis. The Journal of Systems and Software 21(3), 279–290 (1993)
Grunske, L.: Towards an integration of standard component-based safety evaluation techniques with saveCCM. In: Hofmeister, C., Crnković, I., Reussner, R. (eds.) QoSA 2006. LNCS, vol. 4214, pp. 199–213. Springer, Heidelberg (2006)
Heitmeyer, C.L., Kirby, J., Labaw, B.G., Archer, M., Bharadwaj, R.: Using abstraction and model checking to detect safety violations in requirements specifications. IEEE Trans. Software Eng. 24(11), 927–948 (1998)
IEC. Analysis techniques for system reliability: Procedures for failure mode and effect analysis. International Standard 812. IEC Geneva (1985)
Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42–77. Springer, Heidelberg (2005)
Kolovos, D., Paige, R., Polack, F.: The Epsilon Transformation Language. In: Vallecillo, A., Gray, J., Pierantonio, A. (eds.) ICMT 2008. LNCS, vol. 5063, pp. 46–60. Springer, Heidelberg (2008)
Kolovos, D., Paige, R., Polack, F.: On the evolution of OCL for capturing structural constraints in modelling languages. In: Rigorous Object-Oriented Methods. Springer, Heidelberg (2008)
Kolovos, D.S., Paige, R.F.: Epsilon model management platform (2008), www.eclipse.org/gmt/epsilon
Kolovos, D.S., Paige, R.F., Polack, F.: The Epsilon Object Language (EOL). In: Rensink, A., Warmer, J. (eds.) ECMDA-FA 2006. LNCS, vol. 4066, pp. 128–142. Springer, Heidelberg (2006)
McDermid, J.A., Nicholson, M., Pumfrey, D.J., Fenelon, P.: Experience with the application of HAZOP to computer-based systems. In: Compass 1995: 10th Annual Conference on Computer Assurance, Gaithersburg, Maryland, pp. 37–48. National Institute of Standards and Technology (1995)
Simpson, H.R.: The MASCOT method. Software Engineering Journal 1(3), 103–120 (1986)
Wallace, M.: Modular architectural representation and analysis of fault propagation and transformation. In: FESCA 2005. ENTCS. Elsevier, Amsterdam (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Paige, R.F., Rose, L.M., Ge, X., Kolovos, D.S., Brooke, P.J. (2009). FPTC: Automated Safety Analysis for Domain-Specific Languages. In: Chaudron, M.R.V. (eds) Models in Software Engineering. MODELS 2008. Lecture Notes in Computer Science, vol 5421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01648-6_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-01648-6_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01647-9
Online ISBN: 978-3-642-01648-6
eBook Packages: Computer ScienceComputer Science (R0)