An Ontological Approach to Elicit Safety Requirements
Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are defined based on the results issued from the safety...
Uloženo v:
| Vydáno v: | 2017 24th Asia Pacific Software Engineering Conference (APSEC) s. 713 - 718 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.12.2017
|
| Témata: | |
| ISBN: | 1538636816, 9781538636817 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are defined based on the results issued from the safety analysis. In this paper, we introduce a heuristic approach to elicit safety requirements based on the knowledge about hazard's causes, hazard's sources and hazard's consequences (i.e. hazard's components) acquired during the safety analysis. The proposed approach is based on a Hazard Ontology that is used to structure the knowledge about the hazards identified during the safety analysis in order to make it available and accessible for requirements elicitation. We describe how this information can be used to elicit safety requirements, and provide a guidance to derive the safety requirements which are appropriate to deal with the hazards they mitigate. |
|---|---|
| AbstractList | Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are defined based on the results issued from the safety analysis. In this paper, we introduce a heuristic approach to elicit safety requirements based on the knowledge about hazard's causes, hazard's sources and hazard's consequences (i.e. hazard's components) acquired during the safety analysis. The proposed approach is based on a Hazard Ontology that is used to structure the knowledge about the hazards identified during the safety analysis in order to make it available and accessible for requirements elicitation. We describe how this information can be used to elicit safety requirements, and provide a guidance to derive the safety requirements which are appropriate to deal with the hazards they mitigate. Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able to implement the correct risk mitigations, it is fundamental that safety requirements are de- fined based on the results issued from the safety analysis. In this paper, we introduce a heuristic approach to elicit safety requirements based on the knowledge about hazards causes, hazards sources and hazards consequences (i.e. hazards components) acquired during the safety analysis. The proposed approach is based on a Hazard Ontology that is used to structure the knowledge about the hazards identified during the safety analysis in order to make it available and accessible for requirements elicitation. We describe how this information can be used to elicit safety requirements, and provide a guidance to derive the safety requirements which are appropriate to deal with the hazards they mitigate. |
| Author | Zhou, Jiale Hanninen, Kaj Provenzano, Luciana Lundqvist, Kristina |
| Author_xml | – sequence: 1 givenname: Luciana surname: Provenzano fullname: Provenzano, Luciana – sequence: 2 givenname: Kaj surname: Hanninen fullname: Hanninen, Kaj – sequence: 3 givenname: Jiale surname: Zhou fullname: Zhou, Jiale – sequence: 4 givenname: Kristina surname: Lundqvist fullname: Lundqvist, Kristina |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-37099$$DView record from Swedish Publication Index (Mälardalens högskola) |
| BookMark | eNpNzF1LwzAUxvGICrq5S6-86Qdw8yRZmvSyzPkCg4kb3paT5HSLdE1tO8a-vcJEvHr4w49nwC7qWBNjtxwmnEP2kL-t5rOJAK4nGT9jA66kSWVqeHr-P67YqOs-AUCINJOcXzOV18my7mMVN8FhleRN00Z026SPybwKLvTJCkvqj8k7fe1DSzuq--6GXZZYdTT63SFbP83Xs5fxYvn8OssX4yC46MfeaU8kDCpptbE-RW29RYdUcuNwKoCMQKs0Kmv81KDPlCcOCErJ0skhuz_ddgdq9rZo2rDD9lhEDMVj-MiL2G6Knd8WUkOW_fC7Ew9E9IeNhBRAy29UJ1ea |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL ADTPV BNKNJ DF7 |
| DOI | 10.1109/APSEC.2017.91 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present SwePub SwePub Conference SWEPUB Mälardalens högskola |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 1538636816 9781538636817 |
| EndPage | 718 |
| ExternalDocumentID | oai_DiVA_org_mdh_37099 8306007 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIB RIC RIE RIL ADTPV BNKNJ DF7 |
| ID | FETCH-LOGICAL-i212t-dc7dee28a53b78bd6a7bdbacaef18ca420e82ab57a5b8d48ad95de10a0553fc3 |
| IEDL.DBID | RIE |
| ISBN | 1538636816 9781538636817 |
| ISICitedReferencesCount | 11 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000428733800084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Tue Nov 04 16:18:23 EST 2025 Wed Aug 27 02:52:37 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i212t-dc7dee28a53b78bd6a7bdbacaef18ca420e82ab57a5b8d48ad95de10a0553fc3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_8306007 swepub_primary_oai_DiVA_org_mdh_37099 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-Dec. 2017 |
| PublicationDateYYYYMMDD | 2017-12-01 2017-01-01 |
| PublicationDate_xml | – month: 12 year: 2017 text: 2017-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | 2017 24th Asia Pacific Software Engineering Conference (APSEC) |
| PublicationTitleAbbrev | APSEC |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0002269311 |
| Score | 2.0871208 |
| Snippet | Safety requirements describe risk mitigations against failures that may cause catastrophic consequences on human life, environment and facilities. To be able... |
| SourceID | swepub ieee |
| SourceType | Open Access Repository Publisher |
| StartPage | 713 |
| SubjectTerms | 5G mobile communication hazard's components hazards ontologies Safety requirements safety requirements elicitation Software engineering |
| Title | An Ontological Approach to Elicit Safety Requirements |
| URI | https://ieeexplore.ieee.org/document/8306007 https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-37099 |
| WOSCitedRecordID | wos000428733800084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61ePBUtRXrixz05rb7yiZ7XGqLp1pskd6WZDPBBd2Wdiv4702y2y2IF2-BEMLMkHll5huE7kOfKl-o2NERj3BCrmNWoaLIYUpFnAhFhRB22ASdTtlyGc9a6LHphQEAW3wGA7O0f_lyle1MqmzItH9rW8ePKKVVr1aTT9FuRBx43gFGc5jM5uORKd6iA4PAaYen_AIEtUZk0vnf9aeod-jGw7PGzpyhFhTnqLMfx4Dr19lFJCnwS1HutRlOarhwXK7w-CPP8hLPuYLyG7-Cqf-1icFtDy0m48Xo2amnIji5NjOlIzMqAXzGSSAoEzLiVEjBMw7KYxkPfReYzwWhmtVMhozLmEjwXO4SEqgsuEDtYlXAJcKERxR8kK4Itb70BWcGjCaWscEU1NT3UdcwIV1XuBdpTX8fPVQ8bDYMRPVT_pakml3pp3xPA6odz6u_j1-jEyOTqiTkBrXLzQ5u0XH2VebbzZ0V6g8AEKWk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9jCnqauonzMwe92W1NmyY9lrkxcc7hhuxWkibBgnaydYL_vUlaOxAv3gIhkPceeV957_cAuPYRUYir0NERD3d8pmNWroLAoUoFDHNFOOd22ASZTOhiEU5r4LbqhZFS2uIz2TFL-5cvlsnGpMq6VPu3tnV8B_s-coturSqjoh2J0HPdLZBmN5rOBn1TvkU6BoPTjk_5BQlqzciw8b8LHIDWth8PTitLcwhqMjsCjZ-BDLB8n02Aoww-ZfmPPoNRCRgO8yUcvKVJmsMZUzL_gs_SVADb1OC6BebDwbw_csq5CE6qDU3uiIQIKRFl2OOEchEwwgVnCZPKpQnzUU9SxDgmmtlU-JSJEAvp9lgPY08l3jGoZ8tMngCIWUAkkqLHfa0xEWfUwNGEIjSogpr6NmgaJsQfBfJFXNLfBjcFD6sNA1J9l75EsWZX_C5eY49o1_P07-NXYG80fxzH4_vJwxnYN_IpCkTOQT1fbeQF2E0-83S9urQC_gbJ7ajr |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+24th+Asia+Pacific+Software+Engineering+Conference+%28APSEC%29&rft.atitle=An+Ontological+Approach+to+Elicit+Safety+Requirements&rft.au=Provenzano%2C+Luciana&rft.au=Hanninen%2C+Kaj&rft.au=Zhou%2C+Jiale&rft.au=Lundqvist%2C+Kristina&rft.date=2017-12-01&rft.pub=IEEE&rft.spage=713&rft.epage=718&rft_id=info:doi/10.1109%2FAPSEC.2017.91&rft.externalDocID=8306007 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781538636817/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781538636817/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781538636817/sc.gif&client=summon&freeimage=true |

