DGLR-Workshop 11.Oktober 2006

Size: px
Start display at page:

Download "DGLR-Workshop 11.Oktober 2006"

Transcription

1 Zertifizierung von generierter Software für f Kernkraftwerke J. Märtz ISTec GmbH, Forschungsgelaende, D Garching

2 Assessment Report BE-SECBS Benchmark Exercise of Safety Evaluation of Computer Based Systems Project-Consortium: - Industrial Partner providing the Reference-System (MADTEB-System) Assessment-Teams: - IRSN (Frankreich) - ISTec (BRD) - VTT/STUK (Finnland) Project-Coordinator: - JRC-IE 2

3 Assessment Object Description MADTEB System Part of the reactor limitation system to limit the allowed range of process variables (coolant pressure, pressurizer level) of the primary coolant loop of the reactor Consisting of 8 limitation functions implemented in 4 redundant trains Implemented in TELEPERM XS (TXS) Technology Implementation comprising Data-Acquisition, Limitation-Functions, Priority-Functions, Output- Functions for all 4 trains consisting of about 300 Function Diagrams of TXS 3

4 TXS BASIC STRUCTURE Specification based on a graphical user interface (SPACE) I&C functions (functional diagrams FD) are constructed from prefabricated, normed basic elements (function blocks FB) and are organized as groups (functional diagram groups FDG) which are executed cyclically on single processing units. The graphical specification is stored in a database. Code generation is based only on database tables, and uses and includes only prefabricated FB modules and declaration files. Function Diagram 4

5 ASSESSMENT OBJECT RELEVANT PROPERTIES Properties of Test Case due to Implementation in TXS-Technology: Strict formal unambiguous character already in the first specification steps by use of Function Diagrams Function Diagrams can be automatically checked for consistence. Resulting C-code is so called Normed Source Code with some predefined properties Strictly cyclic and data independent execution of the code within a fixed time interval Strictly linear control flow structure, i. e. the execution path ( and executiontiming) is predefined and not dependent on input data Resulting C-code is based on a code-library, the so called Function-Blocks. Function-Blocks are type-tested software components that allow to rely on their compliance with the specification of their functional properties in a data sheet. 5

6 BASIS FOR ASSESSMENT Standards: IEC KTA 3503 ( Type-Testing of electrical modules of the reactor protection system ) National Regulatory Rule Type-Test: Pre-developed components (Function-Blocks, RTE) are tested application-independent Subsequent applications of these components can refer to this Type- Test and do not need to assess these components again. 6

7 ASSESSMENT ACTIVITIES Adaptation of the Assessment Methodology to the Test Object being Normed Code (TXS) Assessment Steps performed, according to Life-Cycle-Steps of IEC and Development Documentation: Requirement-Spec System Specification Detail Design Coding / RETRANS-Analysis Testing 7

8 ADAPTATION OF ASSESSMENT METHODOLOGY Impact of TXS-Properties (Normed Code) on Assessment Methodology: No need for static analysis (e.g. LDRA-Testbed, CANTATA) of the generated code in order to identify complexity of code structure, control flow paths or some other properties supporting the assessment activities, as it is the case with conventional (not normed) software No need for dynamic analysis for measuring of test-coverage, because the test-coverage is predefined by the structure of the automatically generated code. There is only one main path that is executed in each cycle. Amount of Testing determined by functional aspects 8

9 OVERALL STRUCTURE OF ASSESSMENT ACTIVITIES Basic Documents: Development documents Function-Diagrams in database Assessment-Method Desk inspection of the respective documents Analysis of the functionality of the Function-Diagrams in the database by Application of SPACE-Tool for analysis of the Function-Diagrams (navigating through the system / tracing the signal-paths) Application of RETRANS (developed at ISTec) checking the functional equivalence of automatically generated source code with its underlying specification. Assessment-Output / LOPs Basic Framework for Assessment-Steps Document containing a List of Open Points (LOPs) LOPs handed out for audit and clarification to the developer Paper with comments on the LOPs sent back to Assessor 9

10 List of Open Points / LOPs Problems addressed in the LOPs Inconsistencies between different Specification Levels especially between descriptions and Function Diagrams Completeness of documentation Unambigousness of descriptions and of technical details Main Benefits of the LOPs Identification of errors insufficiencies and weak points of the product improving safety and quality of product. Identification of inconsistencies and insufficiencies of the documentation initiating revisions and updating of documentation renders a consistent and complete status of documentation 10

11 FINDINGS OF THE ASSESSMENT-STEPS STEPS Majority of the LOPs referring to changes and modifications not explicitly documented or explained, during translation of Process Requirements into FD-Templates Identification of a Fault by the LOP-Procedure System Specification vs. Requirement-Spec Check of a consistent and correct translation of the I&C functions description of the Process Requirements, into Prototype Function-Diagrams Assessor-Question: Scrutinising the opening- and closing-behaviour of a specific injection valve in various plant-status-transitions the assessor demands further explanations within his LOPs. Developer-Answer: Developer approves that for the operating of this injection valve a fault would be introduced due to an inappropriate aspect in the Requirement Specification. Reason for this fault: The validation of the Requirement-Spec. by process-engineering was out of the scope of this benchmark test-case! For real systems the Requirement Spec. is validated by process-engineering. 11

12 FINDINGS OF THE ASSESSMENT-STEPS STEPS Detail-Design vs. System-Spec Majority of LOPs referring to undocumented modifications between Template Function Diagrams and final implementation. Also one not intended modification was identified. Redefinition of logic during Detail Design (shifting of tasks between different Function- Diagrams) Modifications due to Results of Simulation-Tool during design of Function-Diagrams Priority Logic Assessment identified insufficient implementation of Priority Logic within the Software of TXS Function-Diagrams According to developer-response priority is implemented by an external logic downstream TXS outputs Inconsistent Modification Not intended inconsistency introduced while creating the Function-Diagrams from FD-Template by inhomogeneous usage of Flip-Flop-types No impact on functional behaviour of the integrated system (RCP-Speed). 12

13 RETRANS ANALYSIS TOOL-STRUCTURE FDG - Module FD - Module1 FD - Modulen ANSI-C source codes reverse transformation FDG - Module FD - Module FD - Module 1 n SPACEreverse transformed information comparison deviations, analysisprotocol data base 13

14 RETRANS ANALYSIS ANALYSIS RESULTS RETRANS Essential results of the software analysis tool: Automatic comparison of the graphic specification of the application programs stored in a database with the functionality of the automatically generated C-Source Code. Hints for the analyser with respect to the plausibility of FB parameters in redundant channels. Hints concerning inconsistencies in the database resp. in the C-Source Code (e.g. signalling, parameterisation) 14

15 RESULTS OF CODE-ANAYSIS BY RETRANS RETRANS-Analysis Comparison and plausibility check for the whole C-Code of Benchmark- Testcase with the content of corresponding BE-SECBS database About 300 FDs, about 1000 pages of Diagrams. Results and Findings The C-Code of the Benchmark-Test-Object is in accordance with the function diagrams in the related SPACE data base. Some non-uniform sequentialisations, yet without impact on correct functionality RETRANS plausibility check identified minor deficiencies of the benchmark test-case: deviations within extensions of some block-numbering incorrect explanatory text for some signal identifiers. Both deficiencies don t violate the correctness of code, yet they have to be avoided within real safety applications. The plausibility control in real applications yields more findings which finally are errors. 15

16 ASSESSMENT-STEP STEP TESTING Testing The amount of testing required for the assessment of this TXS-Code (Normed Code) only depending on the functionality of the system under test independent of any code-coverage-measuring. Basic testing strategy performed by the developer (Functional Tests) refer to the basic functionality of the system specific properties of the functionality interface to its environment concerning I&C and process system behaviour under failure condition for relevant ranges and combinations of input signals Comprehensiveness and sufficiency of Testing: Validation of process engineering aspects was not foreseen and not performed within this benchmark-exercise. 16

17 SUMMARY of BENCHMARK- -EXERCISE at ISTec Summary Normed Code, which is automatically generated, has an essential impact on the type of the required assessment activities. Assessment method applied in the benchmark test-case provides the following important benefits for the V&V process: Identification of inconsistencies and insufficiencies within and between the various development documents Complete and comprehensive documentation representing the actual status of development Tracing of all the modifications implemented during the development process Assessment as a diverse and supplementary method to testing is capable to find errors, weak points or insufficiencies that pass the software development process. 17

18 CONCLUSION Normed-Code-Systems support the Assessment Activities and thus contribute to SAFETY Formal method (Function Diagrams) for the description of the system from the very beginning of the development Approved components (Type-Testing) Approved structure and properties (Type Testing) Concentration of assessment on application-specific aspects COST-EFFECTIVENESS Some Assessment-Tasks are performed once for all by Type-Testing Reduction of aspects to check for an individual implementation Checks can be reasonably automated (RETRANS) due to the Normed Structure of the Code. 18

Coded Calculation for Floating Point Values in Safety I&C - Implementation and Experiences

Coded Calculation for Floating Point Values in Safety I&C - Implementation and Experiences Coded Calculation for Floating Point Values in Safety I&C - Implementation and Experiences Arndt LINDNER 1, Christian GERST 2, and Andreas MÖLLEKEN 3 1. TÜV Rheinland ISTec-GmbH, Boltzmannstr. 14, Garching,

More information

Role of I&C Conceptual Design in NPP Licensing

Role of I&C Conceptual Design in NPP Licensing Role of I&C Conceptual Design in NPP Licensing RASU Deputy Design Division Director, Head of Subdivision Galivets Eugeniy Moscow October, 2016 Abstract Currently, modern NPP construction projects face

More information

Software Engineering 2 A practical course in software engineering. Ekkart Kindler

Software Engineering 2 A practical course in software engineering. Ekkart Kindler Software Engineering 2 A practical course in software engineering Quality Management Main Message Planning phase Definition phase Design phase Implem. phase Acceptance phase Mainten. phase 3 1. Overview

More information

IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT

IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT M. BAUN, R. BROSCHE, A. KASTENMÜLLER Technische Universität München, Forschungsneutronenquelle Heinz

More information

TickITplus Implementation Note

TickITplus Implementation Note Title Changes to the Core Scheme Requirements V1.1.2 Date January 2014 Reference TIN010-1401 Originator Dave Wynn Version v1r0 Key Terms Core Scheme Requirements The CSR has been updated to version V1.1.2

More information

The evolution of the cookbook

The evolution of the cookbook The evolution of the cookbook Angela E. Summers, Ph.D., P.E Michela Gentile, Ph.D. Mary Kay O Connor Process Safety Center 2006 International Symposium Beyond Regulatory Compliance, Making Safety Second

More information

CERTIFICATION RULES - PORTABLE FIRE EXTINGUISHERS

CERTIFICATION RULES - PORTABLE FIRE EXTINGUISHERS Accredited product certification CERTIFICATION RULES - PORTABLE FIRE EXTINGUISHERS Revisions in this document: Rev. no. Date Description of revision 3 2015-08-25 4.8 Added information regarding certificate

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Advanced Software Engineering: Software Testing

Advanced Software Engineering: Software Testing Advanced Software Engineering: Software Testing COMP 3705(L4) Sada Narayanappa Anneliese Andrews Thomas Thelin Carina Andersson Web: http://www.megadatasys.com Assisted with templates News & Project News

More information

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0 Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials

More information

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 1: Processes and tiered assessment of conformance

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 1: Processes and tiered assessment of conformance INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 19770-1 Second edition 2012-06-15 Information technology Software asset management Part 1: Processes and tiered

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Joint Interpretation Library

Joint Interpretation Library Object: Define concept and methodology applicable to composite product evaluation. Version 1.5 October 2017 October 2017 Version1.5 Page 1/55 This page is intentionally left blank Page 2/55 Version 1.5

More information

Verification and Validation

Verification and Validation Verification and Validation Assuring that a software system meets a user's needs Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 19 Slide 1 Objectives To introduce software verification

More information

Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 22 Slide 1

Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 22 Slide 1 Verification and Validation Slide 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V

More information

ΗΜΥ 317 Τεχνολογία Υπολογισμού

ΗΜΥ 317 Τεχνολογία Υπολογισμού ΗΜΥ 317 Τεχνολογία Υπολογισμού Εαρινό Εξάμηνο 2008 ΙΑΛΕΞΕΙΣ 18-19: Έλεγχος και Πιστοποίηση Λειτουργίας ΧΑΡΗΣ ΘΕΟΧΑΡΙ ΗΣ Λέκτορας ΗΜΜΥ (ttheocharides@ucy.ac.cy) [Προσαρμογή από Ian Sommerville, Software

More information

Report. Certificate Z

Report. Certificate Z Report to the Certificate Z10 14 06 78930 002 Software tool for safety-related development TESSY Manufacturer Razorcat Development GmbH Witzlebenplatz 4 D-14057 Berlin Report no. RB 84018 C Revision: 1.3,

More information

CERT C++ COMPLIANCE ENFORCEMENT

CERT C++ COMPLIANCE ENFORCEMENT CERT C++ COMPLIANCE ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO MAINTAIN COMPLIANCE SIMPLIFY AND STREAMLINE CERT C++ COMPLIANCE The CERT C++ compliance module reports on dataflow problems, software defects,

More information

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs. In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of

More information

NNR Regulatory Position on FPGA Based Digital I&C Systems

NNR Regulatory Position on FPGA Based Digital I&C Systems NNR Regulatory Position on FPGA Based Digital I&C Systems Gerard Lekhema National Nuclear Regulator - South Africa 11th International Workshop on Application of FPGAs in Nuclear Power Plants 8 11 October

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS Approved By: Executive: Accreditation: Mpho Phaloane Revised By: RBI STC Working Group Members Date

More information

Contents. Process flow diagrams and other documentation

Contents. Process flow diagrams and other documentation Process flow diagrams and other documentation Contents 1. Audit lessons 2. Process flows 3. Flowcharts 4. Information produced by entity (IPE) 5. Documentation Topic 1: Audit lessons Audit lessons Teams

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) BELAC 2-405-ISMS R0 2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) The only valid versions of the documents

More information

DOCUMENTATION AND QUALITY ASSURANCE

DOCUMENTATION AND QUALITY ASSURANCE SPECIFICATION PREFACE SHEET DEPARTMENT: Engineering / Instrumentation SHEET 1 OF 12 AREA: Grundartangi Reduction Plant SPEC No: 00/07/TS012 REV: C2 STANDARD TECHNICAL SPECIFICATION FOR DOCUMENTATION AND

More information

Objectives. Chapter 19. Verification vs. validation. Topics covered. Static and dynamic verification. The V&V process

Objectives. Chapter 19. Verification vs. validation. Topics covered. Static and dynamic verification. The V&V process Objectives Chapter 19 Verification and Validation Assuring that a software system meets a user s need are to introduce software verification and validation (V&V) and to discuss the distinction between

More information

Payment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution

Payment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Payment Card Industry (PCI) Point-to-Point Encryption Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Revision 1.1 June 2017 Document Changes Date Use with Version

More information

Transforming Source Data to Critical Information and Insight. Global Standards: Information Quality Story

Transforming Source Data to Critical Information and Insight. Global Standards: Information Quality Story Transforming Source Data to Critical Information and Insight Global Standards: Information Quality Story You use IHS Standards information every day to make critical decisions that impact your business

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Summary of FERC Order No. 791

Summary of FERC Order No. 791 Summary of FERC Order No. 791 On November 22, 2013, the Federal Energy Regulatory Commission ( FERC or Commission ) issued Order No. 791 adopting a rule that approved Version 5 of the Critical Infrastructure

More information

Tool Qualification Plan for Testwell CTC++

Tool Qualification Plan for Testwell CTC++ Tool Qualification Plan for Testwell CTC++ Version: 0.8 Date: 2014-11-17 Status: Author: File: Size: Generic / Adapted / Presented / Generated / Reviewed / Final Dr. Martin Wildmoser, Dr. Oscar Slotosch

More information

Public Safety Canada. Audit of the Business Continuity Planning Program

Public Safety Canada. Audit of the Business Continuity Planning Program Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely

More information

1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake

1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake Sample ISTQB examination 1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake 2 Regression testing should

More information

Risk Informed Cyber Security for Nuclear Power Plants

Risk Informed Cyber Security for Nuclear Power Plants Risk Informed Cyber Security for Nuclear Power Plants Phillip L. Turner, Timothy A. Wheeler, Matt Gibson Sandia National Laboratories Electric Power Research Institute Albuquerque, NM USA Charlotte, NC

More information

Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process

Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process UK MathWorks Aerospace & Defence Industry Working Group Guidelines for deployment of MathWorks R2010a toolset within

More information

Software Quality. Chapter What is Quality?

Software Quality. Chapter What is Quality? Chapter 1 Software Quality 1.1 What is Quality? The purpose of software quality analysis, or software quality engineering, is to produce acceptable products at acceptable cost, where cost includes calendar

More information

Verification, Validation, and Test with Model-Based Design

Verification, Validation, and Test with Model-Based Design 2008-01-2709 Verification, Validation, and Test with Model-Based Design Copyright 2008 The MathWorks, Inc Tom Erkkinen The MathWorks, Inc. Mirko Conrad The MathWorks, Inc. ABSTRACT Model-Based Design with

More information

ISO/IEC TR TECHNICAL REPORT

ISO/IEC TR TECHNICAL REPORT TECHNICAL REPORT ISO/IEC TR 27019 First edition 2013-07-15 Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

COMMON CAUSE AND COMMON SENSE

COMMON CAUSE AND COMMON SENSE COMMON CAUSE AND COMMON SENSE Designing Failure Out of Your SIS Angela E. Summers, Ph.D., P.E. and Glenn Raney Common Cause and Common Sense Designing Failure Out of Your SIS, ISA EXPO 1998, Houston, Texas,

More information

Software architecture in ASPICE and Even-André Karlsson

Software architecture in ASPICE and Even-André Karlsson Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

Certification Report

Certification Report Certification Report EMC VNX OE for Block v05.33 and File v8.1 with Unisphere v1.3 running on VNX Series Hardware Models VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, and VNX8000 Issued by: Communications

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 61508-6 First edition 2000-04 Functional safety of electrical/electronic/ programmable electronic safety-related systems Part 6: Guidelines on the application of IEC 61508-2

More information

Functional Safety Processes and SIL Requirements

Functional Safety Processes and SIL Requirements Functional Safety Processes and SIL Requirements Jordi Campos Tüv Süd Process Safety Business Manager Jordi.campos@tuev-sued.es 15-07-14 Terminology Safety Instrumented Systems (SIS) Safety Integrity Level

More information

DATA PROCESSING PROCEDURES FOR UCR EPA ENVIRONMENTAL CHAMBER EXPERIMENTS. Appendix B To Quality Assurance Project Plan

DATA PROCESSING PROCEDURES FOR UCR EPA ENVIRONMENTAL CHAMBER EXPERIMENTS. Appendix B To Quality Assurance Project Plan DATA PROCESSING PROCEDURES FOR UCR EPA ENVIRONMENTAL CHAMBER EXPERIMENTS Appendix B To Quality Assurance Project Plan DRAFT Version 1.3 April 25, 2002 William P. L. Carter Atmospheric Processes Group CE-CERT

More information

Alexion Pharma International Trading

Alexion Pharma International Trading Alexion Pharma International Trading Impact of Revised Annex 16 on Outsourced Activities Eva Duffy (Sr. QP) April 2016 Alexion: Background information for the purpose of this presentation Alexion Pharma

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Medical devices Quality management Medical device nomenclature data structure

Medical devices Quality management Medical device nomenclature data structure INTERNATIONAL STANDARD ISO 15225 Third edition 2016-03-15 Medical devices Quality management Medical device nomenclature data structure Dispositifs médicaux Management de la qualité Structure des données

More information

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF FOOD SAFETY MANAGEMENT SYSTEMS

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF FOOD SAFETY MANAGEMENT SYSTEMS BELAC 2-405-FSMS Rev 1-2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF FOOD SAFETY MANAGEMENT SYSTEMS The only valid versions of the documents of the BELAC management

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

Green Star Volume Certification. Process Guide

Green Star Volume Certification. Process Guide Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Overview The desire to use tools to increase validation productivity with the consequent

More information

FedRAMP Security Assessment Plan (SAP) Training

FedRAMP Security Assessment Plan (SAP) Training FedRAMP Security Assessment Plan (SAP) Training 1. FedRAMP_Training_SAP_v6_508 1.1 FedRAMP Online Training: SAP Overview Splash Screen Transcript Title of FedRAMP logo. FedRAMP Online Training; Security

More information

Information technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL

Information technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL Provläsningsexemplar / Preview TECHNICAL REPORT ISO/IEC TR 20000-11 First edition 2015-12-15 Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011

More information

Automation, Software and Information Technology. ISaGRAF 5.1 assessment according to IEC ICS Triplex ISaGRAF Inc. Canada

Automation, Software and Information Technology. ISaGRAF 5.1 assessment according to IEC ICS Triplex ISaGRAF Inc. Canada Automation, Software and Information Technology ISaGRAF 5.1 assessment according to IEC 61499 Canada Report-No.: 968/EL 434.01/07 Date: 2007-03-14 Report-No.: 968/EL 434.01/07 Page 1 of 6 ISaGRAF 5.1 assessment

More information

Small Organisations. Ivor Macfarlane. Copyright IBM Corporation 2009

Small Organisations. Ivor Macfarlane. Copyright IBM Corporation 2009 Service Management ITSM, ITIL Small Organisations Ivor Macfarlane Copyright IBM Corporation 2009 1 Big Teams have Specialists itsmf Hungary, March 2010 slide 2 Small Teams have to be Versatile Multi-skilled

More information

3D/xxx/INF Quick Reference Manual for the Validation Team for IEC CDD (IEC DB)

3D/xxx/INF Quick Reference Manual for the Validation Team for IEC CDD (IEC DB) For IEC use only 3D/xxx/INF 2008-12 INTERNATIONAL ELECTROTECHNICAL COMMISSION TECHNICAL COMMITTEE NO. 3: INFORMATION STRUCTURES, DOCUMENTATION AND GRAPHICAL SYMBOLS SUBCOMMITTEE NO. 3D: DATA SETS FOR LIBRARIES

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should

More information

UK EPR GDA PROJECT. Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011. Resolution Plan Revision History

UK EPR GDA PROJECT. Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011. Resolution Plan Revision History RP unique number: GI-UKEPR-CI-01-RP 0 30/06/2011 1 of 19 Approved for EDF by: A. PETIT Approved for AREVA by: C. WOOLDRIDGE Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011 Resolution Plan History

More information

Safety-critical embedded systems, fault-tolerant control systems, fault detection, fault localization and isolation

Safety-critical embedded systems, fault-tolerant control systems, fault detection, fault localization and isolation Fault detection in safety-critical embedded systems nomen VERBER i, MA TJAl COLNARIC i, AND WOLFGANG A. HALANG 2 JUniversity of Maribor, Faculty of Electrical Engineering and Computer Science, 2000 Maribor,

More information

Software Quality Assurance Procedures for NRC Thermal Hydraulic Codes

Software Quality Assurance Procedures for NRC Thermal Hydraulic Codes NUREG- 1737 Software Quality Assurance Procedures for NRC Thermal Hydraulic Codes U.S. Nuclear Regulatory Commission Office of Nuclear Regulatory Research Washington, DC 20555-0001 i AVAILABILITY OF REFERENCE

More information

Heuristic Evaluation of Groupware. How to do Heuristic Evaluation of Groupware. Benefits

Heuristic Evaluation of Groupware. How to do Heuristic Evaluation of Groupware. Benefits Kimberly Tee ketee@ucalgary.ca CPSC 681 Topic Heuristic Evaluation of Groupware Heuristic evaluation [9] is a discount evaluation method for finding usability problems in a singleuser interface design.

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013!

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013! Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are

More information

GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS

GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS Enhance Care, Optimize Health Outcomes and Minimize Loss of Reimbursements with High Quality Data www.gcinfosys.com GCI D CLENZ HEALTH DATA CLEANSING SOLUTIONS

More information

NEWCASTLE CLINICAL TRIALS UNIT STANDARD OPERATING PROCEDURES

NEWCASTLE CLINICAL TRIALS UNIT STANDARD OPERATING PROCEDURES SOP details SOP title: Protocol development SOP number: TM 010 SOP category: Trial Management Version number: 03 Version date: 16 December 2016 Effective date: 16 January 2017 Revision due date: 16 January

More information

Quality Indicators for Automotive Test Case Specifications

Quality Indicators for Automotive Test Case Specifications Quality Indicators for Automotive Test Case Specifications Katharina Juhnke Daimler AG Group Research & MBC Development Email: katharina.juhnke@daimler.com Matthias Tichy Ulm University Institute of Software

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

A SEMI-FORMAL METHOD TO VERIFY CORRECTNESS OF FUNCTIONAL REQUIREMENTS SPECIFICATIONS OF COMPLEX EMBEDDED SYSTEM

A SEMI-FORMAL METHOD TO VERIFY CORRECTNESS OF FUNCTIONAL REQUIREMENTS SPECIFICATIONS OF COMPLEX EMBEDDED SYSTEM A SEMI-FORMAL METHOD TO VERIFY CORRECTNESS OF FUNCTIONAL REQUIREMENTS SPECIFICATIONS OF Nihal Kececi Department of Computer Science Université du Québec à Montréal Software Engineering Management Research

More information

Verification and Test with Model-Based Design

Verification and Test with Model-Based Design Verification and Test with Model-Based Design Flight Software Workshop 2015 Jay Abraham 2015 The MathWorks, Inc. 1 The software development process Develop, iterate and specify requirements Create high

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

CUBE. Configuration Management Report. Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu

CUBE. Configuration Management Report. Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu CUBE Configuration Management Report Configuration Management Report Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu 2010 C U B E C O N F I G U R A T I O N M A N A G E M E N T R E P O R T Table

More information

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to Quality Improvement: Data Quality Improvement.

More information

REPORT 2015/186 INTERNAL AUDIT DIVISION

REPORT 2015/186 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective

More information

USDA ISO Guide 65 Program Accreditation for Certification Bodies

USDA ISO Guide 65 Program Accreditation for Certification Bodies Page 1 of 6 USDA ISO Guide 65 Program Accreditation for Certification Bodies 1 Purpose This document provides the requirements to be met in designing a USDA ISO Guide 65 Program. It also provides the requirements

More information

Unofficial Comment Form Project Operating Personnel Communications Protocols COM-002-4

Unofficial Comment Form Project Operating Personnel Communications Protocols COM-002-4 Project 2007-02 Operating Personnel Communications Protocols COM-002-4 Please DO NOT use this form. Please use the electronic comment form to submit comments on the proposed draft COM 002 4 (Operating

More information

COMPUTER FLOOD STANDARDS

COMPUTER FLOOD STANDARDS COMPUTER FLOOD STANDARDS CF-1 Flood Model Documentation A. Flood model functionality and technical descriptions shall be documented formally in an archival format separate from the use of letters, slides,

More information

DISCUSSION PAPER. Board of Certification Oral Examination Consistency

DISCUSSION PAPER. Board of Certification Oral Examination Consistency DISCUSSION PAPER Issue : Prepared for: Board of Certification Oral Examination istency CIPHI - Board of Certification Date: June 20, 2003 BACKGROUND The Certificate in Public Health Inspection (Canada),

More information

Information technology Security techniques Code of practice for personally identifiable information protection

Information technology Security techniques Code of practice for personally identifiable information protection INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated

More information

ida Certification Services IEC Functional Safety Assessment Project: Masoneilan Smart Valve Interface, SVI II ESD Customer: GE Energy

ida Certification Services IEC Functional Safety Assessment Project: Masoneilan Smart Valve Interface, SVI II ESD Customer: GE Energy e ida Certification Services IEC 61508 Functional Safety Assessment Project: Masoneilan Smart Valve Interface, SVI II ESD Customer: GE Energy Avon, MA USA Contract Number: Q13/01-021 Report No.: GEE Q1301021

More information

Verification and Validation

Verification and Validation Lecturer: Sebastian Coope Ashton Building, Room G.18 E-mail: coopes@liverpool.ac.uk COMP 201 web-page: http://www.csc.liv.ac.uk/~coopes/comp201 Verification and Validation 1 Verification and Validation

More information

Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation

Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Prof. Dr.-Ing. Stefan Kowalewski Chair Informatik 11, Embedded Software Laboratory RWTH Aachen University Summer Semester

More information

Read Me First for the HP ProCurve Wireless Products - software ver

Read Me First for the HP ProCurve Wireless Products - software ver Read Me First for the Wireless Products - software ver. 2.1.0 This Read Me First provides information for the following products: Wireless Access Point 520wl (J8133A) 802.11a AP Kit 160wl - N America +

More information

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina

More information

Online SHQ Compliance Checklist Final Version October 1, 2009

Online SHQ Compliance Checklist Final Version October 1, 2009 Online SHQ Compliance Checklist Final Version October 1, 2009 Online SHQ Compliance Checklist, October 1, 2009, REV 7/20/2009 Page 1 Contents Introduction... 3 Scope... 3 Auditing... 3 Document Conventions

More information

Maximize Your Assets Securely and Cost Effectively

Maximize Your Assets Securely and Cost Effectively S E N T I N E L P O I N T S E R V I C E S Maximize Your Assets Securely and Cost Effectively Competently track and manage your communication system and network through Altura Sentinel Point Services. We

More information

Software Engineering (CSC 4350/6350) Rao Casturi

Software Engineering (CSC 4350/6350) Rao Casturi Software Engineering (CSC 4350/6350) Rao Casturi Testing Software Engineering -CSC4350/6350 - Rao Casturi 2 Testing What is testing? Process of finding the divergence between the expected behavior of the

More information

AERONAUTICAL COMMUNICATION PANEL WORKING GROUP N. PM-CPDLC Validation Report

AERONAUTICAL COMMUNICATION PANEL WORKING GROUP N. PM-CPDLC Validation Report ACP WGN/5 WP19 AERONAUTICAL COMMUNICATION PANEL WORKING GROUP N PM-CPDLC Validation Report SUMMARY This paper gives the results of the PM-CPDLC ATN Application (version 1) validation effort. Version: 0.1

More information