SlideShare a Scribd company logo
1 of 18
Download to read offline
1
ASSUER 2014
Linking Traceability with GSN
Nov/05/2014
Kenji Taguchi, Daisuke Souma, Hideki Nishihara
Research Institute for Secure Systems
National Institute of Advanced Industrial Science and
Technology (AIST)
Toshinori Takai
Graduate School of Information Science
Nara Institute of Science and Technology (NAIST)
2
Overview
• Background
 Safety related regulations mandate the submission of safety cases
to relevant authorities to ensure the safety of the systems.
 Regulations (Railway safety cases regulation and Offshore installation
safety cases regulation)
 Standards (e.g., Def-Stand 00-56, IEC 62425, ISO 26262)
 Guidelines (e.g., Railway yellow book or International ESM handbook
(iESM))
• Evidence of safety case is of great importance, since the quality of
evidence affects the quality of safety case.
• Traceability is used to validate evidence (work
products/deliverables/artifacts) produced during the system life cycle.
• We propose one way to link traceability with GSN.
3
Why linking GSN and Traceability?
• Traceability is “the ability to link product requirements
back to stakeholders' rationales and forward to
corresponding design artifacts, code, and test
cases”(From Wiki).
• In GSN evidence and relevant documents are referenced
in contexts and solutions, but it is not certain how they
contribute to traceability.
• A new convention is proposed how to reference
traceability information in GSN diagrams. We can then
check whether all of the substantial traceability
information is referenced in GSN diagrams in a proper
way.
4
Some assumptions
• Target standard
 EN 50126 / IEC 62278 Railway applications –Specification
and demonstration of reliability, availability, maintainability
and safety (RAMS)
 Proposed technique can be applied to any other standard.
• Safety case construction is supported by GSN (Goal
Structuring Notation).
• Traceability is achieved through the design of TIM (
Traceability Information Model).
Creating a TIM is recommended practice pointed out by Cleland-Huang with people from FDA.
5
APPROACH
RAMS’s life cycle
TIM
Traceability
GSN
Safety Case
Safety Case
Traces between artifacts
Scope of this paper
6
Basic Traceability Information Model (TIM)
System has a safety life cycle.
Safety life cycle has phase(s).
Traceable artifact
Artefacts (deliverables) to be
traced.
They may exist at least one in
each phase.
Each artifact may have different
artifact(s).
Traceable unit
Part(s) of traceable artifact,
which is linked.
Link
Relationship between traceable
units
Has target and source
May have a type
7
How Safety Cases, GSN and TIM are related
Safety Case and GSN TIM
8
Whole Picture of TIM for RAMS (phase 2 ~ phase 4)
 Current model only depicts phase 3 in detail and phase 2 and 4 are
partially depicted in this picture.
9
Overview of TIM for RAMS phase 3
Hazard LogItems required for this phase, but not in the scope of
Traceability.
• IEC 62278 phase 3 requires identification of hazard,
hazardous event, risk assessment criteria and risk
management process.
• Main deliverable of this phase is Hazard log.
10
Detailed Picture of TIM for RAMS phase 3
RAMS phase 3
Deliverable to be traced
Traceable units
Stereotypes are derived
From the basic TIM.
11
Argument Structure for RAMS phase 3
12
13
New convention to support linking GSN and TIM
GSN Context
GSN Solution
TIM
GSN
14
Validation Method for Safety Cases
Validation Criteria/Methods have not been well researched yet.
How to review GSN diagrams has the same issue.
Some standard specifically states how to review safety cases (e.g., ISO
26262).
We would like to propose some criteria based on traceability.
(Validation criteria for safety cases in ISO 26262
15
New Criteria
1) Complete Coverage
w.r.t traceability
A GSN diagram references all of
traceable artifacts in TIM.
2) Forward coverage
w.r.t traceability
If G1, …., Gn are ordered, any
traceable unit referenced in Gj is
linked in another traceable unit
referenced in Gk (1≦j < k ≦n)
16
More complex criterion
RAMS Standard
17
Related Work
• Cleland-Huang, et. al, suggest the use of traceability to
maintain safety case evidence.
• Hull et. al, propose an argument structure called a ”satisfaction
argument”, which specifies the generally hidden rationale
behind the design on traceability between artifacts.
• Attwood, et. al., adopted the idea and applied it to GSN.
• Nair, et. al, proposed a more generic TIM called SafeTIM.
• Katta, et. al, created similar traceability model, but did not
present clear relationships between traceability model and
safety case.
18
Conclusion
• We presented a new convention how GSN is linked with
traceability information.
• We also proposed some validation criteria for GSN based
on traceability information.
• Complete coverage
• Forward coverage
• Expect to provide a mechanical means to check the validity of
GSN.
• Future work
• Lift this framework to real safety case construction.
• Evaluate whether this kind of traceability links provide
validation criteria on a safety case.
• Tool support to automate the validation process.

More Related Content

Similar to Linking Traceability with GSN (Assure 2014)

Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
eSAT Publishing House
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013
Vincenzo De Florio
 

Similar to Linking Traceability with GSN (Assure 2014) (20)

Weapon Detection and Classification in CCTV Footage
Weapon Detection and Classification in CCTV FootageWeapon Detection and Classification in CCTV Footage
Weapon Detection and Classification in CCTV Footage
 
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPL
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Rtlws2013
Rtlws2013Rtlws2013
Rtlws2013
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...
 
Rbi final report
Rbi final reportRbi final report
Rbi final report
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
Application of ANFIS in Civil Engineering- A Critical Review
Application of ANFIS in Civil Engineering- A Critical ReviewApplication of ANFIS in Civil Engineering- A Critical Review
Application of ANFIS in Civil Engineering- A Critical Review
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 
Weapon Detection using Artificial Intelligence and Deep Learning for Security...
Weapon Detection using Artificial Intelligence and Deep Learning for Security...Weapon Detection using Artificial Intelligence and Deep Learning for Security...
Weapon Detection using Artificial Intelligence and Deep Learning for Security...
 
Towards modelling and analysing non-functional properties of SoS
Towards modelling and analysing non-functional properties of SoSTowards modelling and analysing non-functional properties of SoS
Towards modelling and analysing non-functional properties of SoS
 
Applications of Deep Learning in Construction Industry
Applications of Deep Learning in Construction IndustryApplications of Deep Learning in Construction Industry
Applications of Deep Learning in Construction Industry
 
IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

Linking Traceability with GSN (Assure 2014)

  • 1. 1 ASSUER 2014 Linking Traceability with GSN Nov/05/2014 Kenji Taguchi, Daisuke Souma, Hideki Nishihara Research Institute for Secure Systems National Institute of Advanced Industrial Science and Technology (AIST) Toshinori Takai Graduate School of Information Science Nara Institute of Science and Technology (NAIST)
  • 2. 2 Overview • Background  Safety related regulations mandate the submission of safety cases to relevant authorities to ensure the safety of the systems.  Regulations (Railway safety cases regulation and Offshore installation safety cases regulation)  Standards (e.g., Def-Stand 00-56, IEC 62425, ISO 26262)  Guidelines (e.g., Railway yellow book or International ESM handbook (iESM)) • Evidence of safety case is of great importance, since the quality of evidence affects the quality of safety case. • Traceability is used to validate evidence (work products/deliverables/artifacts) produced during the system life cycle. • We propose one way to link traceability with GSN.
  • 3. 3 Why linking GSN and Traceability? • Traceability is “the ability to link product requirements back to stakeholders' rationales and forward to corresponding design artifacts, code, and test cases”(From Wiki). • In GSN evidence and relevant documents are referenced in contexts and solutions, but it is not certain how they contribute to traceability. • A new convention is proposed how to reference traceability information in GSN diagrams. We can then check whether all of the substantial traceability information is referenced in GSN diagrams in a proper way.
  • 4. 4 Some assumptions • Target standard  EN 50126 / IEC 62278 Railway applications –Specification and demonstration of reliability, availability, maintainability and safety (RAMS)  Proposed technique can be applied to any other standard. • Safety case construction is supported by GSN (Goal Structuring Notation). • Traceability is achieved through the design of TIM ( Traceability Information Model). Creating a TIM is recommended practice pointed out by Cleland-Huang with people from FDA.
  • 5. 5 APPROACH RAMS’s life cycle TIM Traceability GSN Safety Case Safety Case Traces between artifacts Scope of this paper
  • 6. 6 Basic Traceability Information Model (TIM) System has a safety life cycle. Safety life cycle has phase(s). Traceable artifact Artefacts (deliverables) to be traced. They may exist at least one in each phase. Each artifact may have different artifact(s). Traceable unit Part(s) of traceable artifact, which is linked. Link Relationship between traceable units Has target and source May have a type
  • 7. 7 How Safety Cases, GSN and TIM are related Safety Case and GSN TIM
  • 8. 8 Whole Picture of TIM for RAMS (phase 2 ~ phase 4)  Current model only depicts phase 3 in detail and phase 2 and 4 are partially depicted in this picture.
  • 9. 9 Overview of TIM for RAMS phase 3 Hazard LogItems required for this phase, but not in the scope of Traceability. • IEC 62278 phase 3 requires identification of hazard, hazardous event, risk assessment criteria and risk management process. • Main deliverable of this phase is Hazard log.
  • 10. 10 Detailed Picture of TIM for RAMS phase 3 RAMS phase 3 Deliverable to be traced Traceable units Stereotypes are derived From the basic TIM.
  • 12. 12
  • 13. 13 New convention to support linking GSN and TIM GSN Context GSN Solution TIM GSN
  • 14. 14 Validation Method for Safety Cases Validation Criteria/Methods have not been well researched yet. How to review GSN diagrams has the same issue. Some standard specifically states how to review safety cases (e.g., ISO 26262). We would like to propose some criteria based on traceability. (Validation criteria for safety cases in ISO 26262
  • 15. 15 New Criteria 1) Complete Coverage w.r.t traceability A GSN diagram references all of traceable artifacts in TIM. 2) Forward coverage w.r.t traceability If G1, …., Gn are ordered, any traceable unit referenced in Gj is linked in another traceable unit referenced in Gk (1≦j < k ≦n)
  • 17. 17 Related Work • Cleland-Huang, et. al, suggest the use of traceability to maintain safety case evidence. • Hull et. al, propose an argument structure called a ”satisfaction argument”, which specifies the generally hidden rationale behind the design on traceability between artifacts. • Attwood, et. al., adopted the idea and applied it to GSN. • Nair, et. al, proposed a more generic TIM called SafeTIM. • Katta, et. al, created similar traceability model, but did not present clear relationships between traceability model and safety case.
  • 18. 18 Conclusion • We presented a new convention how GSN is linked with traceability information. • We also proposed some validation criteria for GSN based on traceability information. • Complete coverage • Forward coverage • Expect to provide a mechanical means to check the validity of GSN. • Future work • Lift this framework to real safety case construction. • Evaluate whether this kind of traceability links provide validation criteria on a safety case. • Tool support to automate the validation process.