Username   Password       Forgot your password?  Forgot your username? 

 

STAMP-based Hazard Analysis for Computer-Controlled Systems using Petri Nets

Volume 14, Number 9, September 2018, pp. 1997-2007
DOI: 10.23940/ijpe.18.09.p7.19972007

Danjiang Zhu, Shuzhen Yao, and Chonghao Xu

School of Computer Science and Engineering, Beihang University, Beijing, 100083, China

(Submitted on May 30, 2018; Revised on July 21, 2018; Accepted on August 12, 2018)

Abstract:

Systems-Theoretic Accident Modeling and Process (STAMP) is a novel accident causality model and has been used in various areas. Most of the STAMP based hazard analysis methods are ad-hoc without rigorous procedures, and the process model used in STAMP is too simple to identify the hazardous control actions as the causes. Petri nets, which have been used to graphically model computer-controlled systems and resolve system safety issues, can make the hazard analysis with STAMP more effective. To identify the hazardous control actions in the STAMP-based hazard analysis, extended Petri nets are proposed in this paper to model the control processes in the system control structure. The runtime control action failures are considered in the reachability graph for the hazard analysis. Furthermore, the types of hazardous control actions are studied and analyzed in the extended reachability graph.

 

References: 24

              1. N. Leveson, “Rasmussen’s Legacy: A Paradigm Change in Engineering for Safety,” Applied Ergonomics, Vol. 59, No. Pt B, pp. 581-591, 2017
              2. N. Leveson, “Engineering a Safer World: Systems Thinking Applied to Safety,” MIT Press, Cambridge, Massachusetts, 2011
              3. C. A. Ericson, “Hazard Analysis Techniques for System Safety,” John Wiley & Sons, New York, 2005
              4. J. Thomas, “Extending and Automating a Systems-Theoretic Hazard Analysis for Requirements Generation and Analysis,” Office of Scientific & Technical Information Technical Reports, 2013
              5. C. H. Fleming, M. Spencer, and N. Leveson, “Safety Assurance in NextGen,” Safety Science, Vol. 55, No. 2, pp. 173-187, 2012
              6. N. Leveson, “A New Accident Model for Engineering Safer Systems,” Safety Science, Vol. 42, No. 4, pp. 237-270, 2004
              7. J. Thomas and N. G. Leveson, “Performing Hazard Analysis on Complex Software and Human-Intensive Systems,” in Proceedings of the International System Safety Society Conference, Las Vegas, 2011
              8. N. G. Leveson, “New Approach to Hazard Analysis for Complex Systems,” in Proceedings of the International Conference of the System Safety Society, Ottawa, Canada, 2003
              9. W. Stefan, “Open Tool Support for System-Theoretic Process Analysis,” Iste Uni, Vol. 3, No.4, pp. 23-31, 2014
              10. R. M. Krauss and C. Hilbes, “Tool Qualification Considerations for Tools Supporting STPA,” Procedia Engineering, Vol. 128, No. 4, pp. 15-24, 2015
              11. A. Abdulkhaleq, S. Wagner, and N. Leveson, “A Comprehensive Safety Engineering Approach for Software Intensive Systems based on STPA,” Procedia Engineering, Vol. 128, No. 3, pp. 2-11, 2015
              12. M. C. Zhou and F. Dicesare, “Petri Net Synthesis for Discrete Event Control of Manufacturing Systems,” Kluwer Academic, 1993
              13. R. Wang, W. Zheng, C. Liang, and T. Tang, “An Integrated Hazard Identification Method based on the Hierarchical Colored Petri Net,” Safety Science, Vol. 2016, No. 88, pp. 166-179, 2016
              14. G. Ciardo, “Petri Nets with Marking-Dependent Arc Cardinality: Properties and Analysis, Application and Theory of Petri Nets,” Springer, Berlin, Heidelberg, 1994
              15. N. G. Leveson and J. L. Stolzy, “Safety Analysis using Petri Nets,” IEEE Transactions on Software Engineering, Vol. 13, No. 3, pp. 386-397, 1987
              16. H. Reza, M. Pimple, V. Krishna, and J. Hildle, “A Safety Analysis Method using Fault Tree Analysis and Petri Nets,” in Proceedings of International Conference on Information Technology: New Generations, IEEE, pp. 1089-1094, 2009
              17. Y. Y. Du and B. Q. Guo, “Logic Petri Nets and Equivalency,” Information Technology Journal, Vol. 8, No. 1, pp. 95-100, 2009
              18. U. Montanari and F. Rossi, “Contextual Nets,” Acta Informatica, Vol. 32, No. 6, pp. 545-596, 1995
              19. P. Baldan, A. Corradini, and U. Montanari, “Contextual Petri Nets, Asymmetric Event Structures, and Processes,” Information & Computation, Vol. 171, No. 1, pp. 1-49, 2001
              20. Y. Y. Du and C. J. Jiang, “Formal Representation and Analysis of Batch Stock Trading Systems by Logical Petri Net Workflows,” in Proceedings of International Conference on Formal Engineering Methods, Vol. 2495, pp. 221-225, 2002
              21. Y. Y. Du, L. Qi, and M. C. Zhou, “A Vector Matching Method for Analysing Logic Petri Nets,” Enterprise Information Systems, Vol. 5, No. 4, pp. 449-468, 2011
              22. S. M. Cho, H. S. Hong, and S. D. Cha, “Safety Analysis using Coloured Petri Nets,” in Proceedings of Asia-Pacific Software Engineering Conference, IEEE Computer Society, 1996
              23. J. Thomas, “An Integrated Approach to Requirements Development and Hazard Analysis,” SAE Technical Paper, 2015
              24. J. Thomas and D. Suo, “STPA-based Method to Identify and Control Feature Interactions in Large Complex Systems,” Procedia Engineering, Vol. 128, pp. 12-14, 2015

                           

                          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                          Attachments:
                          Download this file (07-IJPE-09-07.pdf)07-IJPE-09-07.pdf[STAMP-based Hazard Analysis for Computer-Controlled Systems using Petri Nets]902 Kb
                           
                          This site uses encryption for transmitting your passwords. ratmilwebsolutions.com