TY - GEN
T1 - A method for constructing fault trees from AADL models
AU - Li, Yue
AU - Zhu, Yi An
AU - Ma, Chun Yan
AU - Xu, Meng
PY - 2011
Y1 - 2011
N2 - System safety analysis based on fault tree has been widely used for providing assurance to the stringent safety requirement of safety-critical systems. Generating fault trees from models described in AADL, a promising standard language for modeling complicated embedded system, would realize the automation of system safety analysis which is traditionally performed manually. This paper proposes a whole method for constructing fault trees from AADL models, whose main idea is to extract fault information from AADL models by dynamically tracing the possible fault sources of the specified fault objective, store them into a proposed database structure, and then construct fault trees based on the extracted fault information in the database structure. Further, the challenge posed by the common problems of deadlock and fault tree sharing is resolved by one algorithm called Sharing-Label in our method. We prove the correctness of the whole method theoretically.
AB - System safety analysis based on fault tree has been widely used for providing assurance to the stringent safety requirement of safety-critical systems. Generating fault trees from models described in AADL, a promising standard language for modeling complicated embedded system, would realize the automation of system safety analysis which is traditionally performed manually. This paper proposes a whole method for constructing fault trees from AADL models, whose main idea is to extract fault information from AADL models by dynamically tracing the possible fault sources of the specified fault objective, store them into a proposed database structure, and then construct fault trees based on the extracted fault information in the database structure. Further, the challenge posed by the common problems of deadlock and fault tree sharing is resolved by one algorithm called Sharing-Label in our method. We prove the correctness of the whole method theoretically.
UR - http://www.scopus.com/inward/record.url?scp=80052761500&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-23496-5_18
DO - 10.1007/978-3-642-23496-5_18
M3 - 会议稿件
AN - SCOPUS:80052761500
SN - 9783642234958
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 243
EP - 258
BT - Autonomic and Trusted Computing - 8th International Conference, ATC 2011, Proceedings
T2 - 8th International Conference on Autonomic and Trusted Computing, ATC 2011
Y2 - 2 September 2011 through 4 September 2011
ER -