DGLR-Workshop 11.Oktober 2006
|
|
- Dorthy Foster
- 6 years ago
- Views:
Transcription
1 Zertifizierung von generierter Software für f Kernkraftwerke J. Märtz ISTec GmbH, Forschungsgelaende, D Garching
2 Assessment Report BE-SECBS Benchmark Exercise of Safety Evaluation of Computer Based Systems Project-Consortium: - Industrial Partner providing the Reference-System (MADTEB-System) Assessment-Teams: - IRSN (Frankreich) - ISTec (BRD) - VTT/STUK (Finnland) Project-Coordinator: - JRC-IE 2
3 Assessment Object Description MADTEB System Part of the reactor limitation system to limit the allowed range of process variables (coolant pressure, pressurizer level) of the primary coolant loop of the reactor Consisting of 8 limitation functions implemented in 4 redundant trains Implemented in TELEPERM XS (TXS) Technology Implementation comprising Data-Acquisition, Limitation-Functions, Priority-Functions, Output- Functions for all 4 trains consisting of about 300 Function Diagrams of TXS 3
4 TXS BASIC STRUCTURE Specification based on a graphical user interface (SPACE) I&C functions (functional diagrams FD) are constructed from prefabricated, normed basic elements (function blocks FB) and are organized as groups (functional diagram groups FDG) which are executed cyclically on single processing units. The graphical specification is stored in a database. Code generation is based only on database tables, and uses and includes only prefabricated FB modules and declaration files. Function Diagram 4
5 ASSESSMENT OBJECT RELEVANT PROPERTIES Properties of Test Case due to Implementation in TXS-Technology: Strict formal unambiguous character already in the first specification steps by use of Function Diagrams Function Diagrams can be automatically checked for consistence. Resulting C-code is so called Normed Source Code with some predefined properties Strictly cyclic and data independent execution of the code within a fixed time interval Strictly linear control flow structure, i. e. the execution path ( and executiontiming) is predefined and not dependent on input data Resulting C-code is based on a code-library, the so called Function-Blocks. Function-Blocks are type-tested software components that allow to rely on their compliance with the specification of their functional properties in a data sheet. 5
6 BASIS FOR ASSESSMENT Standards: IEC KTA 3503 ( Type-Testing of electrical modules of the reactor protection system ) National Regulatory Rule Type-Test: Pre-developed components (Function-Blocks, RTE) are tested application-independent Subsequent applications of these components can refer to this Type- Test and do not need to assess these components again. 6
7 ASSESSMENT ACTIVITIES Adaptation of the Assessment Methodology to the Test Object being Normed Code (TXS) Assessment Steps performed, according to Life-Cycle-Steps of IEC and Development Documentation: Requirement-Spec System Specification Detail Design Coding / RETRANS-Analysis Testing 7
8 ADAPTATION OF ASSESSMENT METHODOLOGY Impact of TXS-Properties (Normed Code) on Assessment Methodology: No need for static analysis (e.g. LDRA-Testbed, CANTATA) of the generated code in order to identify complexity of code structure, control flow paths or some other properties supporting the assessment activities, as it is the case with conventional (not normed) software No need for dynamic analysis for measuring of test-coverage, because the test-coverage is predefined by the structure of the automatically generated code. There is only one main path that is executed in each cycle. Amount of Testing determined by functional aspects 8
9 OVERALL STRUCTURE OF ASSESSMENT ACTIVITIES Basic Documents: Development documents Function-Diagrams in database Assessment-Method Desk inspection of the respective documents Analysis of the functionality of the Function-Diagrams in the database by Application of SPACE-Tool for analysis of the Function-Diagrams (navigating through the system / tracing the signal-paths) Application of RETRANS (developed at ISTec) checking the functional equivalence of automatically generated source code with its underlying specification. Assessment-Output / LOPs Basic Framework for Assessment-Steps Document containing a List of Open Points (LOPs) LOPs handed out for audit and clarification to the developer Paper with comments on the LOPs sent back to Assessor 9
10 List of Open Points / LOPs Problems addressed in the LOPs Inconsistencies between different Specification Levels especially between descriptions and Function Diagrams Completeness of documentation Unambigousness of descriptions and of technical details Main Benefits of the LOPs Identification of errors insufficiencies and weak points of the product improving safety and quality of product. Identification of inconsistencies and insufficiencies of the documentation initiating revisions and updating of documentation renders a consistent and complete status of documentation 10
11 FINDINGS OF THE ASSESSMENT-STEPS STEPS Majority of the LOPs referring to changes and modifications not explicitly documented or explained, during translation of Process Requirements into FD-Templates Identification of a Fault by the LOP-Procedure System Specification vs. Requirement-Spec Check of a consistent and correct translation of the I&C functions description of the Process Requirements, into Prototype Function-Diagrams Assessor-Question: Scrutinising the opening- and closing-behaviour of a specific injection valve in various plant-status-transitions the assessor demands further explanations within his LOPs. Developer-Answer: Developer approves that for the operating of this injection valve a fault would be introduced due to an inappropriate aspect in the Requirement Specification. Reason for this fault: The validation of the Requirement-Spec. by process-engineering was out of the scope of this benchmark test-case! For real systems the Requirement Spec. is validated by process-engineering. 11
12 FINDINGS OF THE ASSESSMENT-STEPS STEPS Detail-Design vs. System-Spec Majority of LOPs referring to undocumented modifications between Template Function Diagrams and final implementation. Also one not intended modification was identified. Redefinition of logic during Detail Design (shifting of tasks between different Function- Diagrams) Modifications due to Results of Simulation-Tool during design of Function-Diagrams Priority Logic Assessment identified insufficient implementation of Priority Logic within the Software of TXS Function-Diagrams According to developer-response priority is implemented by an external logic downstream TXS outputs Inconsistent Modification Not intended inconsistency introduced while creating the Function-Diagrams from FD-Template by inhomogeneous usage of Flip-Flop-types No impact on functional behaviour of the integrated system (RCP-Speed). 12
13 RETRANS ANALYSIS TOOL-STRUCTURE FDG - Module FD - Module1 FD - Modulen ANSI-C source codes reverse transformation FDG - Module FD - Module FD - Module 1 n SPACEreverse transformed information comparison deviations, analysisprotocol data base 13
14 RETRANS ANALYSIS ANALYSIS RESULTS RETRANS Essential results of the software analysis tool: Automatic comparison of the graphic specification of the application programs stored in a database with the functionality of the automatically generated C-Source Code. Hints for the analyser with respect to the plausibility of FB parameters in redundant channels. Hints concerning inconsistencies in the database resp. in the C-Source Code (e.g. signalling, parameterisation) 14
15 RESULTS OF CODE-ANAYSIS BY RETRANS RETRANS-Analysis Comparison and plausibility check for the whole C-Code of Benchmark- Testcase with the content of corresponding BE-SECBS database About 300 FDs, about 1000 pages of Diagrams. Results and Findings The C-Code of the Benchmark-Test-Object is in accordance with the function diagrams in the related SPACE data base. Some non-uniform sequentialisations, yet without impact on correct functionality RETRANS plausibility check identified minor deficiencies of the benchmark test-case: deviations within extensions of some block-numbering incorrect explanatory text for some signal identifiers. Both deficiencies don t violate the correctness of code, yet they have to be avoided within real safety applications. The plausibility control in real applications yields more findings which finally are errors. 15
16 ASSESSMENT-STEP STEP TESTING Testing The amount of testing required for the assessment of this TXS-Code (Normed Code) only depending on the functionality of the system under test independent of any code-coverage-measuring. Basic testing strategy performed by the developer (Functional Tests) refer to the basic functionality of the system specific properties of the functionality interface to its environment concerning I&C and process system behaviour under failure condition for relevant ranges and combinations of input signals Comprehensiveness and sufficiency of Testing: Validation of process engineering aspects was not foreseen and not performed within this benchmark-exercise. 16
17 SUMMARY of BENCHMARK- -EXERCISE at ISTec Summary Normed Code, which is automatically generated, has an essential impact on the type of the required assessment activities. Assessment method applied in the benchmark test-case provides the following important benefits for the V&V process: Identification of inconsistencies and insufficiencies within and between the various development documents Complete and comprehensive documentation representing the actual status of development Tracing of all the modifications implemented during the development process Assessment as a diverse and supplementary method to testing is capable to find errors, weak points or insufficiencies that pass the software development process. 17
18 CONCLUSION Normed-Code-Systems support the Assessment Activities and thus contribute to SAFETY Formal method (Function Diagrams) for the description of the system from the very beginning of the development Approved components (Type-Testing) Approved structure and properties (Type Testing) Concentration of assessment on application-specific aspects COST-EFFECTIVENESS Some Assessment-Tasks are performed once for all by Type-Testing Reduction of aspects to check for an individual implementation Checks can be reasonably automated (RETRANS) due to the Normed Structure of the Code. 18
Coded Calculation for Floating Point Values in Safety I&C - Implementation and Experiences
Coded Calculation for Floating Point Values in Safety I&C - Implementation and Experiences Arndt LINDNER 1, Christian GERST 2, and Andreas MÖLLEKEN 3 1. TÜV Rheinland ISTec-GmbH, Boltzmannstr. 14, Garching,
More informationRole of I&C Conceptual Design in NPP Licensing
Role of I&C Conceptual Design in NPP Licensing RASU Deputy Design Division Director, Head of Subdivision Galivets Eugeniy Moscow October, 2016 Abstract Currently, modern NPP construction projects face
More informationSoftware Engineering 2 A practical course in software engineering. Ekkart Kindler
Software Engineering 2 A practical course in software engineering Quality Management Main Message Planning phase Definition phase Design phase Implem. phase Acceptance phase Mainten. phase 3 1. Overview
More informationIT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT
IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT M. BAUN, R. BROSCHE, A. KASTENMÜLLER Technische Universität München, Forschungsneutronenquelle Heinz
More informationTickITplus Implementation Note
Title Changes to the Core Scheme Requirements V1.1.2 Date January 2014 Reference TIN010-1401 Originator Dave Wynn Version v1r0 Key Terms Core Scheme Requirements The CSR has been updated to version V1.1.2
More informationThe evolution of the cookbook
The evolution of the cookbook Angela E. Summers, Ph.D., P.E Michela Gentile, Ph.D. Mary Kay O Connor Process Safety Center 2006 International Symposium Beyond Regulatory Compliance, Making Safety Second
More informationCERTIFICATION RULES - PORTABLE FIRE EXTINGUISHERS
Accredited product certification CERTIFICATION RULES - PORTABLE FIRE EXTINGUISHERS Revisions in this document: Rev. no. Date Description of revision 3 2015-08-25 4.8 Added information regarding certificate
More informationPart 5. Verification and Validation
Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this
More informationAdvanced Software Engineering: Software Testing
Advanced Software Engineering: Software Testing COMP 3705(L4) Sada Narayanappa Anneliese Andrews Thomas Thelin Carina Andersson Web: http://www.megadatasys.com Assisted with templates News & Project News
More informationCertified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0
Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To
More informationDatabase Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design
Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information
More informationAdvent IM Ltd ISO/IEC 27001:2013 vs
Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater
More informationAuditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance
Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials
More informationCertified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team
Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer
More informationDeriving safety requirements according to ISO for complex systems: How to avoid getting lost?
Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 1: Processes and tiered assessment of conformance
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 19770-1 Second edition 2012-06-15 Information technology Software asset management Part 1: Processes and tiered
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationJoint Interpretation Library
Object: Define concept and methodology applicable to composite product evaluation. Version 1.5 October 2017 October 2017 Version1.5 Page 1/55 This page is intentionally left blank Page 2/55 Version 1.5
More informationVerification and Validation
Verification and Validation Assuring that a software system meets a user's needs Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 19 Slide 1 Objectives To introduce software verification
More informationIan Sommerville 2006 Software Engineering, 8th edition. Chapter 22 Slide 1
Verification and Validation Slide 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V
More informationΗΜΥ 317 Τεχνολογία Υπολογισμού
ΗΜΥ 317 Τεχνολογία Υπολογισμού Εαρινό Εξάμηνο 2008 ΙΑΛΕΞΕΙΣ 18-19: Έλεγχος και Πιστοποίηση Λειτουργίας ΧΑΡΗΣ ΘΕΟΧΑΡΙ ΗΣ Λέκτορας ΗΜΜΥ (ttheocharides@ucy.ac.cy) [Προσαρμογή από Ian Sommerville, Software
More informationReport. Certificate Z
Report to the Certificate Z10 14 06 78930 002 Software tool for safety-related development TESSY Manufacturer Razorcat Development GmbH Witzlebenplatz 4 D-14057 Berlin Report no. RB 84018 C Revision: 1.3,
More informationCERT C++ COMPLIANCE ENFORCEMENT
CERT C++ COMPLIANCE ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO MAINTAIN COMPLIANCE SIMPLIFY AND STREAMLINE CERT C++ COMPLIANCE The CERT C++ compliance module reports on dataflow problems, software defects,
More informationIn this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.
In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of
More informationNNR Regulatory Position on FPGA Based Digital I&C Systems
NNR Regulatory Position on FPGA Based Digital I&C Systems Gerard Lekhema National Nuclear Regulator - South Africa 11th International Workshop on Application of FPGAs in Nuclear Power Plants 8 11 October
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate
More informationCRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS
CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS Approved By: Executive: Accreditation: Mpho Phaloane Revised By: RBI STC Working Group Members Date
More informationContents. Process flow diagrams and other documentation
Process flow diagrams and other documentation Contents 1. Audit lessons 2. Process flows 3. Flowcharts 4. Information produced by entity (IPE) 5. Documentation Topic 1: Audit lessons Audit lessons Teams
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationSPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)
BELAC 2-405-ISMS R0 2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) The only valid versions of the documents
More informationDOCUMENTATION AND QUALITY ASSURANCE
SPECIFICATION PREFACE SHEET DEPARTMENT: Engineering / Instrumentation SHEET 1 OF 12 AREA: Grundartangi Reduction Plant SPEC No: 00/07/TS012 REV: C2 STANDARD TECHNICAL SPECIFICATION FOR DOCUMENTATION AND
More informationObjectives. Chapter 19. Verification vs. validation. Topics covered. Static and dynamic verification. The V&V process
Objectives Chapter 19 Verification and Validation Assuring that a software system meets a user s need are to introduce software verification and validation (V&V) and to discuss the distinction between
More informationPayment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution
Payment Card Industry (PCI) Point-to-Point Encryption Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Revision 1.1 June 2017 Document Changes Date Use with Version
More informationTransforming Source Data to Critical Information and Insight. Global Standards: Information Quality Story
Transforming Source Data to Critical Information and Insight Global Standards: Information Quality Story You use IHS Standards information every day to make critical decisions that impact your business
More informationInformation technology Security techniques Information security controls for the energy utility industry
INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques
More informationSummary of FERC Order No. 791
Summary of FERC Order No. 791 On November 22, 2013, the Federal Energy Regulatory Commission ( FERC or Commission ) issued Order No. 791 adopting a rule that approved Version 5 of the Critical Infrastructure
More informationTool Qualification Plan for Testwell CTC++
Tool Qualification Plan for Testwell CTC++ Version: 0.8 Date: 2014-11-17 Status: Author: File: Size: Generic / Adapted / Presented / Generated / Reviewed / Final Dr. Martin Wildmoser, Dr. Oscar Slotosch
More informationPublic Safety Canada. Audit of the Business Continuity Planning Program
Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely
More information1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake
Sample ISTQB examination 1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake 2 Regression testing should
More informationRisk Informed Cyber Security for Nuclear Power Plants
Risk Informed Cyber Security for Nuclear Power Plants Phillip L. Turner, Timothy A. Wheeler, Matt Gibson Sandia National Laboratories Electric Power Research Institute Albuquerque, NM USA Charlotte, NC
More informationGuidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process
Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process UK MathWorks Aerospace & Defence Industry Working Group Guidelines for deployment of MathWorks R2010a toolset within
More informationSoftware Quality. Chapter What is Quality?
Chapter 1 Software Quality 1.1 What is Quality? The purpose of software quality analysis, or software quality engineering, is to produce acceptable products at acceptable cost, where cost includes calendar
More informationVerification, Validation, and Test with Model-Based Design
2008-01-2709 Verification, Validation, and Test with Model-Based Design Copyright 2008 The MathWorks, Inc Tom Erkkinen The MathWorks, Inc. Mirko Conrad The MathWorks, Inc. ABSTRACT Model-Based Design with
More informationISO/IEC TR TECHNICAL REPORT
TECHNICAL REPORT ISO/IEC TR 27019 First edition 2013-07-15 Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific
More informationCertification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
More informationCertification Report
Certification Report EAL 4 Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
More informationCOMMON CAUSE AND COMMON SENSE
COMMON CAUSE AND COMMON SENSE Designing Failure Out of Your SIS Angela E. Summers, Ph.D., P.E. and Glenn Raney Common Cause and Common Sense Designing Failure Out of Your SIS, ISA EXPO 1998, Houston, Texas,
More informationSoftware architecture in ASPICE and Even-André Karlsson
Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12
More informationThe HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information
The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,
More informationCertification Report
Certification Report EMC VNX OE for Block v05.33 and File v8.1 with Unisphere v1.3 running on VNX Series Hardware Models VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, and VNX8000 Issued by: Communications
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 61508-6 First edition 2000-04 Functional safety of electrical/electronic/ programmable electronic safety-related systems Part 6: Guidelines on the application of IEC 61508-2
More informationFunctional Safety Processes and SIL Requirements
Functional Safety Processes and SIL Requirements Jordi Campos Tüv Süd Process Safety Business Manager Jordi.campos@tuev-sued.es 15-07-14 Terminology Safety Instrumented Systems (SIS) Safety Integrity Level
More informationDATA PROCESSING PROCEDURES FOR UCR EPA ENVIRONMENTAL CHAMBER EXPERIMENTS. Appendix B To Quality Assurance Project Plan
DATA PROCESSING PROCEDURES FOR UCR EPA ENVIRONMENTAL CHAMBER EXPERIMENTS Appendix B To Quality Assurance Project Plan DRAFT Version 1.3 April 25, 2002 William P. L. Carter Atmospheric Processes Group CE-CERT
More informationAlexion Pharma International Trading
Alexion Pharma International Trading Impact of Revised Annex 16 on Outsourced Activities Eva Duffy (Sr. QP) April 2016 Alexion: Background information for the purpose of this presentation Alexion Pharma
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationMedical devices Quality management Medical device nomenclature data structure
INTERNATIONAL STANDARD ISO 15225 Third edition 2016-03-15 Medical devices Quality management Medical device nomenclature data structure Dispositifs médicaux Management de la qualité Structure des données
More informationSPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF FOOD SAFETY MANAGEMENT SYSTEMS
BELAC 2-405-FSMS Rev 1-2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF FOOD SAFETY MANAGEMENT SYSTEMS The only valid versions of the documents of the BELAC management
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationGreen Star Volume Certification. Process Guide
Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationMoving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.
Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Overview The desire to use tools to increase validation productivity with the consequent
More informationFedRAMP Security Assessment Plan (SAP) Training
FedRAMP Security Assessment Plan (SAP) Training 1. FedRAMP_Training_SAP_v6_508 1.1 FedRAMP Online Training: SAP Overview Splash Screen Transcript Title of FedRAMP logo. FedRAMP Online Training; Security
More informationInformation technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL
Provläsningsexemplar / Preview TECHNICAL REPORT ISO/IEC TR 20000-11 First edition 2015-12-15 Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011
More informationAutomation, Software and Information Technology. ISaGRAF 5.1 assessment according to IEC ICS Triplex ISaGRAF Inc. Canada
Automation, Software and Information Technology ISaGRAF 5.1 assessment according to IEC 61499 Canada Report-No.: 968/EL 434.01/07 Date: 2007-03-14 Report-No.: 968/EL 434.01/07 Page 1 of 6 ISaGRAF 5.1 assessment
More informationSmall Organisations. Ivor Macfarlane. Copyright IBM Corporation 2009
Service Management ITSM, ITIL Small Organisations Ivor Macfarlane Copyright IBM Corporation 2009 1 Big Teams have Specialists itsmf Hungary, March 2010 slide 2 Small Teams have to be Versatile Multi-skilled
More information3D/xxx/INF Quick Reference Manual for the Validation Team for IEC CDD (IEC DB)
For IEC use only 3D/xxx/INF 2008-12 INTERNATIONAL ELECTROTECHNICAL COMMISSION TECHNICAL COMMITTEE NO. 3: INFORMATION STRUCTURES, DOCUMENTATION AND GRAPHICAL SYMBOLS SUBCOMMITTEE NO. 3D: DATA SETS FOR LIBRARIES
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should
More informationUK EPR GDA PROJECT. Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011. Resolution Plan Revision History
RP unique number: GI-UKEPR-CI-01-RP 0 30/06/2011 1 of 19 Approved for EDF by: A. PETIT Approved for AREVA by: C. WOOLDRIDGE Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011 Resolution Plan History
More informationSafety-critical embedded systems, fault-tolerant control systems, fault detection, fault localization and isolation
Fault detection in safety-critical embedded systems nomen VERBER i, MA TJAl COLNARIC i, AND WOLFGANG A. HALANG 2 JUniversity of Maribor, Faculty of Electrical Engineering and Computer Science, 2000 Maribor,
More informationSoftware Quality Assurance Procedures for NRC Thermal Hydraulic Codes
NUREG- 1737 Software Quality Assurance Procedures for NRC Thermal Hydraulic Codes U.S. Nuclear Regulatory Commission Office of Nuclear Regulatory Research Washington, DC 20555-0001 i AVAILABILITY OF REFERENCE
More informationHeuristic Evaluation of Groupware. How to do Heuristic Evaluation of Groupware. Benefits
Kimberly Tee ketee@ucalgary.ca CPSC 681 Topic Heuristic Evaluation of Groupware Heuristic evaluation [9] is a discount evaluation method for finding usability problems in a singleuser interface design.
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationTesting! Prof. Leon Osterweil! CS 520/620! Spring 2013!
Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are
More informationGCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS
GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS Enhance Care, Optimize Health Outcomes and Minimize Loss of Reimbursements with High Quality Data www.gcinfosys.com GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS
More informationNEWCASTLE CLINICAL TRIALS UNIT STANDARD OPERATING PROCEDURES
SOP details SOP title: Protocol development SOP number: TM 010 SOP category: Trial Management Version number: 03 Version date: 16 December 2016 Effective date: 16 January 2017 Revision due date: 16 January
More informationQuality Indicators for Automotive Test Case Specifications
Quality Indicators for Automotive Test Case Specifications Katharina Juhnke Daimler AG Group Research & MBC Development Email: katharina.juhnke@daimler.com Matthias Tichy Ulm University Institute of Software
More informationChapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC
Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post
More informationA SEMI-FORMAL METHOD TO VERIFY CORRECTNESS OF FUNCTIONAL REQUIREMENTS SPECIFICATIONS OF COMPLEX EMBEDDED SYSTEM
A SEMI-FORMAL METHOD TO VERIFY CORRECTNESS OF FUNCTIONAL REQUIREMENTS SPECIFICATIONS OF Nihal Kececi Department of Computer Science Université du Québec à Montréal Software Engineering Management Research
More informationVerification and Test with Model-Based Design
Verification and Test with Model-Based Design Flight Software Workshop 2015 Jay Abraham 2015 The MathWorks, Inc. 1 The software development process Develop, iterate and specify requirements Create high
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationCUBE. Configuration Management Report. Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu
CUBE Configuration Management Report Configuration Management Report Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu 2010 C U B E C O N F I G U R A T I O N M A N A G E M E N T R E P O R T Table
More informationWorking with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.
Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to Quality Improvement: Data Quality Improvement.
More informationREPORT 2015/186 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective
More informationUSDA ISO Guide 65 Program Accreditation for Certification Bodies
Page 1 of 6 USDA ISO Guide 65 Program Accreditation for Certification Bodies 1 Purpose This document provides the requirements to be met in designing a USDA ISO Guide 65 Program. It also provides the requirements
More informationUnofficial Comment Form Project Operating Personnel Communications Protocols COM-002-4
Project 2007-02 Operating Personnel Communications Protocols COM-002-4 Please DO NOT use this form. Please use the electronic comment form to submit comments on the proposed draft COM 002 4 (Operating
More informationCOMPUTER FLOOD STANDARDS
COMPUTER FLOOD STANDARDS CF-1 Flood Model Documentation A. Flood model functionality and technical descriptions shall be documented formally in an archival format separate from the use of letters, slides,
More informationDISCUSSION PAPER. Board of Certification Oral Examination Consistency
DISCUSSION PAPER Issue : Prepared for: Board of Certification Oral Examination istency CIPHI - Board of Certification Date: June 20, 2003 BACKGROUND The Certificate in Public Health Inspection (Canada),
More informationInformation technology Security techniques Code of practice for personally identifiable information protection
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationAerospace Software Engineering
16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated
More informationida Certification Services IEC Functional Safety Assessment Project: Masoneilan Smart Valve Interface, SVI II ESD Customer: GE Energy
e ida Certification Services IEC 61508 Functional Safety Assessment Project: Masoneilan Smart Valve Interface, SVI II ESD Customer: GE Energy Avon, MA USA Contract Number: Q13/01-021 Report No.: GEE Q1301021
More informationVerification and Validation
Lecturer: Sebastian Coope Ashton Building, Room G.18 E-mail: coopes@liverpool.ac.uk COMP 201 web-page: http://www.csc.liv.ac.uk/~coopes/comp201 Verification and Validation 1 Verification and Validation
More informationSafety and Reliability of Software-Controlled Systems Part 14: Fault mitigation
Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Prof. Dr.-Ing. Stefan Kowalewski Chair Informatik 11, Embedded Software Laboratory RWTH Aachen University Summer Semester
More informationRead Me First for the HP ProCurve Wireless Products - software ver
Read Me First for the Wireless Products - software ver. 2.1.0 This Read Me First provides information for the following products: Wireless Access Point 520wl (J8133A) 802.11a AP Kit 160wl - N America +
More informationAPPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05
APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina
More informationOnline SHQ Compliance Checklist Final Version October 1, 2009
Online SHQ Compliance Checklist Final Version October 1, 2009 Online SHQ Compliance Checklist, October 1, 2009, REV 7/20/2009 Page 1 Contents Introduction... 3 Scope... 3 Auditing... 3 Document Conventions
More informationMaximize Your Assets Securely and Cost Effectively
S E N T I N E L P O I N T S E R V I C E S Maximize Your Assets Securely and Cost Effectively Competently track and manage your communication system and network through Altura Sentinel Point Services. We
More informationSoftware Engineering (CSC 4350/6350) Rao Casturi
Software Engineering (CSC 4350/6350) Rao Casturi Testing Software Engineering -CSC4350/6350 - Rao Casturi 2 Testing What is testing? Process of finding the divergence between the expected behavior of the
More informationAERONAUTICAL COMMUNICATION PANEL WORKING GROUP N. PM-CPDLC Validation Report
ACP WGN/5 WP19 AERONAUTICAL COMMUNICATION PANEL WORKING GROUP N PM-CPDLC Validation Report SUMMARY This paper gives the results of the PM-CPDLC ATN Application (version 1) validation effort. Version: 0.1
More information