An Ontological Approach to Elicit Safety Requirements

Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are defined based on the results issued from the safety...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2017 24th Asia Pacific Software Engineering Conference (APSEC) s. 713 - 718
Hlavní autoři: Provenzano, Luciana, Hanninen, Kaj, Zhou, Jiale, Lundqvist, Kristina
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.12.2017
Témata:
ISBN:1538636816, 9781538636817
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are defined based on the results issued from the safety analysis. In this paper, we introduce a heuristic approach to elicit safety requirements based on the knowledge about hazard's causes, hazard's sources and hazard's consequences (i.e. hazard's components) acquired during the safety analysis. The proposed approach is based on a Hazard Ontology that is used to structure the knowledge about the hazards identified during the safety analysis in order to make it available and accessible for requirements elicitation. We describe how this information can be used to elicit safety requirements, and provide a guidance to derive the safety requirements which are appropriate to deal with the hazards they mitigate.
AbstractList Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are defined based on the results issued from the safety analysis. In this paper, we introduce a heuristic approach to elicit safety requirements based on the knowledge about hazard's causes, hazard's sources and hazard's consequences (i.e. hazard's components) acquired during the safety analysis. The proposed approach is based on a Hazard Ontology that is used to structure the knowledge about the hazards identified during the safety analysis in order to make it available and accessible for requirements elicitation. We describe how this information can be used to elicit safety requirements, and provide a guidance to derive the safety requirements which are appropriate to deal with the hazards they mitigate.
Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are de- fined based on the results issued from the safety analysis. In this paper, we introduce a heuristic approach to elicit safety requirements based on the knowledge about hazard’s causes, hazard’s sources and hazard’s consequences (i.e. hazard’s components) acquired during the safety analysis. The proposed approach is based on a Hazard Ontology that is used to structure the knowledge about the hazards identified during the safety analysis in order to make it available and accessible for requirements elicitation. We describe how this information can be used to elicit safety requirements, and provide a guidance to derive the safety requirements which are appropriate to deal with the hazards they mitigate.
Author Zhou, Jiale
Hanninen, Kaj
Provenzano, Luciana
Lundqvist, Kristina
Author_xml – sequence: 1
  givenname: Luciana
  surname: Provenzano
  fullname: Provenzano, Luciana
– sequence: 2
  givenname: Kaj
  surname: Hanninen
  fullname: Hanninen, Kaj
– sequence: 3
  givenname: Jiale
  surname: Zhou
  fullname: Zhou, Jiale
– sequence: 4
  givenname: Kristina
  surname: Lundqvist
  fullname: Lundqvist, Kristina
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-37099$$DView record from Swedish Publication Index (Mälardalens högskola)
BookMark eNpNzF1LwzAUxvGICrq5S6-86Qdw8yRZmvSyzPkCg4kb3paT5HSLdE1tO8a-vcJEvHr4w49nwC7qWBNjtxwmnEP2kL-t5rOJAK4nGT9jA66kSWVqeHr-P67YqOs-AUCINJOcXzOV18my7mMVN8FhleRN00Z026SPybwKLvTJCkvqj8k7fe1DSzuq--6GXZZYdTT63SFbP83Xs5fxYvn8OssX4yC46MfeaU8kDCpptbE-RW29RYdUcuNwKoCMQKs0Kmv81KDPlCcOCErJ0skhuz_ddgdq9rZo2rDD9lhEDMVj-MiL2G6Knd8WUkOW_fC7Ew9E9IeNhBRAy29UJ1ea
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
ADTPV
BNKNJ
DF7
DOI 10.1109/APSEC.2017.91
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
SwePub
SwePub Conference
SWEPUB Mälardalens högskola
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1538636816
9781538636817
EndPage 718
ExternalDocumentID oai_DiVA_org_mdh_37099
8306007
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIB
RIC
RIE
RIL
ADTPV
BNKNJ
DF7
ID FETCH-LOGICAL-i212t-dc7dee28a53b78bd6a7bdbacaef18ca420e82ab57a5b8d48ad95de10a0553fc3
IEDL.DBID RIE
ISBN 1538636816
9781538636817
ISICitedReferencesCount 11
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000428733800084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Tue Nov 04 16:18:23 EST 2025
Wed Aug 27 02:52:37 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i212t-dc7dee28a53b78bd6a7bdbacaef18ca420e82ab57a5b8d48ad95de10a0553fc3
PageCount 6
ParticipantIDs ieee_primary_8306007
swepub_primary_oai_DiVA_org_mdh_37099
PublicationCentury 2000
PublicationDate 2017-Dec.
2017
PublicationDateYYYYMMDD 2017-12-01
2017-01-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-Dec.
PublicationDecade 2010
PublicationTitle 2017 24th Asia Pacific Software Engineering Conference (APSEC)
PublicationTitleAbbrev APSEC
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002269311
Score 2.0871208
Snippet Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able...
SourceID swepub
ieee
SourceType Open Access Repository
Publisher
StartPage 713
SubjectTerms 5G mobile communication
hazard's components
hazards
ontologies
Safety requirements
safety requirements elicitation
Software engineering
Title An Ontological Approach to Elicit Safety Requirements
URI https://ieeexplore.ieee.org/document/8306007
https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-37099
WOSCitedRecordID wos000428733800084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61ePBUtRXrixz05rb7yiZ7XGqLp1pskd6WZDPBBd2Wdiv4702y2y2IF2-BEMLMkHll5huE7kOfKl-o2NERj3BCrmNWoaLIYUpFnAhFhRB22ASdTtlyGc9a6LHphQEAW3wGA7O0f_lyle1MqmzItH9rW8ePKKVVr1aTT9FuRBx43gFGc5jM5uORKd6iA4PAaYen_AIEtUZk0vnf9aeod-jGw7PGzpyhFhTnqLMfx4Dr19lFJCnwS1HutRlOarhwXK7w-CPP8hLPuYLyG7-Cqf-1icFtDy0m48Xo2amnIji5NjOlIzMqAXzGSSAoEzLiVEjBMw7KYxkPfReYzwWhmtVMhozLmEjwXO4SEqgsuEDtYlXAJcKERxR8kK4Itb70BWcGjCaWscEU1NT3UdcwIV1XuBdpTX8fPVQ8bDYMRPVT_pakml3pp3xPA6odz6u_j1-jEyOTqiTkBrXLzQ5u0XH2VebbzZ0V6g8AEKWk
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9jCnqauonzMwe92W1NmyY9lrkxcc7hhuxWkibBgnaydYL_vUlaOxAv3gIhkPceeV957_cAuPYRUYir0NERD3d8pmNWroLAoUoFDHNFOOd22ASZTOhiEU5r4LbqhZFS2uIz2TFL-5cvlsnGpMq6VPu3tnV8B_s-coturSqjoh2J0HPdLZBmN5rOBn1TvkU6BoPTjk_5BQlqzciw8b8LHIDWth8PTitLcwhqMjsCjZ-BDLB8n02Aoww-ZfmPPoNRCRgO8yUcvKVJmsMZUzL_gs_SVADb1OC6BebDwbw_csq5CE6qDU3uiIQIKRFl2OOEchEwwgVnCZPKpQnzUU9SxDgmmtlU-JSJEAvp9lgPY08l3jGoZ8tMngCIWUAkkqLHfa0xEWfUwNGEIjSogpr6NmgaJsQfBfJFXNLfBjcFD6sNA1J9l75EsWZX_C5eY49o1_P07-NXYG80fxzH4_vJwxnYN_IpCkTOQT1fbeQF2E0-83S9urQC_gbJ7ajr
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+24th+Asia+Pacific+Software+Engineering+Conference+%28APSEC%29&rft.atitle=An+Ontological+Approach+to+Elicit+Safety+Requirements&rft.au=Provenzano%2C+Luciana&rft.au=Hanninen%2C+Kaj&rft.au=Zhou%2C+Jiale&rft.au=Lundqvist%2C+Kristina&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=713&rft.epage=718&rft_id=info:doi/10.1109%2FAPSEC.2017.91&rft.externalDocID=8306007
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781538636817/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781538636817/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781538636817/sc.gif&client=summon&freeimage=true