Safety Certification of Software-Intensive Systems with Reusable Components

Size: px
Start display at page:

Download "Safety Certification of Software-Intensive Systems with Reusable Components"

Transcription

1 Safety Certification of Software-Intensive Systems with Reusable Components Report type Report name Deliverable D4.4.1 Guidelines for tools and methodology integration for reusability of component in other domains (on tools/interface level) Dissemination level PU Status Final version Version number 1.0 Date of preparation The SafeCer Consortium 1 (41)

2 Authors Authors Petr Böhm, AIT Thomas Gruber, AIT Stefano Puri, INTECS Ricardo Moreno Ruano, TAS-E Sanchez Angel Alvaro, TAS-E Arjan Geven, TTTECH Ainhoa Aristimuno, ULMA The SafeCer Consortium 2 (41)

3 Revision chart and history log Version Date Reason AIT: TOC first draft AIT: Update after first telco AIT: Update after second telco, Chapter 3.1 and 5 updated INTECS/TAS-E: Contribution to Chapter and AIT: Chapters 1, 2 and 8. AIT:Updates after thirst telco TTTECH: First contribution to Chapters and 4.3 First Ideas to Chapter 5 AIT: Merge the contributions from ULMA and INTECS Small text corrections TTTECH: Conclusions ULMA: Chapter AIT: Chapters 5 and 6 Merge the contributions Last updates Finalizing of the document before the review Finalizing the document after reviews The SafeCer Consortium 3 (41)

4 List of abbreviations API ASIL GG2E CMMI DAL DECOS EMC EPF FMEA FTA GPM HW IEC ISO MTTF PAS PES PFD PLC PSAC SAS SIL SEooC SWooC SFTA SPL SPLE SOUP SW THR V&V Application Program Interface Automotive Safety Integrity Level Club des Grandes Entreprises de l Embarque Capability Maturity Model Integration Design Assurance Level Dependable Embedded Components and Systems Electromagnetic Compatibility Eclipse Process Framework Failure Mode and Effects Analysis Fault Tree Analysis Generic Process Model Hardware International Electrotechnical Commission International Standardization Organization Mean Time To Failure Publicly available specification (in IEC, ISO pre-standard-like) Programmable Electronic System Probability of Failure on Demand Programmable Logic Controller Plan for Software Aspects of Certification Software Accomplishment Summary Safety Integrity Level Safety Element out of Context Software out of Context Software Fault Tree analysis Software Product Line Software Product Line Engineering Software Of Unknown Pedigree Software Tolerable Hazard Rate Verification and Validation The SafeCer Consortium 4 (41)

5 Table of contents Authors... 2 Revision chart and history log... 3 List of abbreviations... 4 Table of contents... 5 List of Figures... 7 List of Tables Introduction Scope of this document Structure of this document Input from previous psafecer work Standards in Other Domains Overview of the Standards for Other Domains IEC and IEC (Healthcare Domain) IEC 61508, IEC 61511, IEC (Industry Domain) ECSS-E-ST-40C and ECSS-Q-ST-80C (Space Domain) Comparison of the Other Domain Standards with IEC Commonalities and differences for the Healthcare Domain Commonalities and differences for the Industry Domain Commonalities and differences for the Space Domain Reuse of Components in Other Domains Healthcare Domain - IEC and IEC Introduction Handling of Safety Case and Evidence for reuse of Software Reuse of Safety related subsystems and components Qualifications Proven In Use Handling Product lines Industry Domain - IEC 61508, IEC 61511, IEC Introduction Handling of Safety Case and Evidence for reuse of Software Reuse of Safety related subsystems and components Qualification Proven In Use Handling Product lines The SafeCer Consortium 5 (41)

6 4.2.7 Strategies for reuse Space Domain - ECSS-E-ST-40C and ECSS-Q-ST-80C Introduction Handling of Safety Case and Evidence for reuse of Software Reuse of Safety related subsystems and components Qualification Proven In Use Handling Product lines Strategies for reuse Results Results for the Healthcare Sector Results for the Industrial Sector Results for the Space Sector Outline for an Open, Extendable and Adaptable Framework for Component Reuse 37 6 Contribution to overall psafecer objectives Conclusions References The SafeCer Consortium 6 (41)

7 List of Figures Figure 1: Relationship of key medical device standards to IEC extracted extracted from [2] - Annex C Figure 2: ECSS Architecture (from ECSS website) Figure 3: Reuse activities Figure 4: Tool qualification activities Figure 5: Mapping of standards from different domains The SafeCer Consortium 7 (41)

8 List of Tables Table 1: Mapping of the parameters used to determine the safety integrity level (Healthcare) Table 2: Severity of Consequences (Table extracted from ECSS-Q-ST-40C) Table 3: Mapping of the parameters used to determine the safety integrity level (Space) The SafeCer Consortium 8 (41)

9 1 Introduction 1.1 Scope of this document This document describes the psafecer Deliverable D4.4.1 Guidelines for tools and methodology integration for reusability of component in other domains (on tools/interface level). The document covers the following domains and standards: Healthcare Domain - IEC and IEC Industry Domain - IEC 61508, IEC and IEC Space Domain - ECSS-E-ST-40C and ECSS-Q-ST-80C 1.2 Structure of this document This document starts with an Overview of the Standards for Other Domains (Healthcare, Industry, Space) in Chapter 3.1. In Chapter 3.2 the comparison with the Standard IEC is given. The Chapter 4 focuses on the reuse of components put forward by the domain-specific standards. Reuse of components can be achieved in different forms and follows different lines, from small building blocks to large complex applications, and the way this reuse is handled in the different domains also varies. This chapter is split between the sections on safety-case aspects, application re-use, qualification, proven in use, and product lines. The Chapter 5 summarizes - in three domain-specific sections - the results of the analysis of the standards-related constraints forming an obstacle to an unified methodology. Subsequently, Chapter 5.4 presents an Outline for an Open, Extendable and Adaptable Framework for Component Reuse. Finally, contribution to the overall psafecer objectives is provided in Chapter 6 and conclusions are provided in Chapter 7. The SafeCer Consortium 9 (41)

10 2 Input from previous psafecer work The results and the experiences from psafecer WP2.1 and WP4.1 are used as a basis, especially the combined Deliverable D2.1.4./D Guidelines with respect to different standards. Modeling and methodology for reusing software in automotive, construction equipment, avionics and railway domains [9] and D2.1.1 A Generic Process Model for Integrated Certification and Development of Component-based Systems [10] The SafeCer Consortium 10 (41)

11 3 Standards in Other Domains In this Chapter an overview of the Standards for Other Domains (Healthcare, Industry, Space) and the comparison with the Standard IEC are given. 3.1 Overview of the Standards for Other Domains IEC and IEC (Healthcare Domain) IEC , Second Edition, is an international standard for the safety of medical electrical equipment. It is actually a set of standards that is broken up into three distinct areas: 1. IEC covers all the general requirements for all electrical medical based products. 2. The collateral standards cover horizontal issues such as system integration, EMC, radiation protection, and programmable electronic medical systems (software, firmware, etc.). The standard numbers are IEC , -1-2, -1-3, and -1-4 respectively. 3. Particular standards deal with a specific type of medical device. The particular standards are identified as IEC XX where XX identifies the particular standard number for the particular type of medical equipment. An example would be IEC is the particular standard for High Frequency Surgical Devices IEC refers to IEC The IEC standard is the base for safety in medical electrical equipment. IEC 62304:2006 (Medical device software Software life cycle processes), defines the life cycle requirements for medical device software. The set of processes, activities, and tasks described in this standard establishes a common framework for medical device software life cycle processes IEC 61508, IEC 61511, IEC (Industry Domain) IEC61508 is regarded as one of the oldest safety standards and therefore the basis for several standards related to generic system functional safety. In this sense, large parts of the IEC61508 are similar to other domains (e.g.. railway and automotive) although at places significant differences and generalizations exist. While IEC61508 is a generic standard for design, construction, and operation of electrical/electronic/programmable electronic systems, IEC61511 focuses attention on one type of instrumented safety system used within the process industry sector, the Safety Instrumented System (SIS). An SIS is engineered to perform specific control functions to failsafe or maintain safe operation of a process when unacceptable or dangerous conditions occur. IEC61131 is a standard applicable for programmable controllers. The IEC is an international standard of rules applied in industry. It is titled Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems (E/E/PE or E/E/PES). This standard sets out a generic approach for all safety lifecycle activities for systems comprised of electrical and/or electronic and/or programmable electronic elements that are used to perform safety functions. As usually safety is achieved by a number of systems which rely on different technologies (e.g. mechanical, hydraulic, electrical etc.), any safety strategy must therefore consider not only all the elements within an individual system but also all the safetyrelated systems making up the total combination of safety-related systems. Although this standard is concerned with E/E/PE safety-related systems, it may also provide a framework within which safety-related systems based on other technologies may be considered. The SafeCer Consortium 11 (41)

12 This standard is organized into 7 parts: Part1: o o o o o Development of the overall safety requirements Allocation of the safety requirements to the E/E/PE safety-related systems Specification of the system safety requirements for the E/E/PE safety-related systems Installation, commissioning & safety validation of E/E/PE safety-related systems Operation, maintenance, repair, modification and retrofit, decommissioning or disposal of E/E/PE safety-related systems Documentation Management of functional safety Functional safety assessment o o o Part2: o Part3: o Realization phase for safety-related software Part4: o Definitions & abbreviations Part5: o Example of methods for the determination of safety integrity levels Part6: o Guidelines for the application of Parts 2 & 3 Part7: o Realization phase for E/E/PE safety-related systems (mainly hardware considerations) Overview of techniques and measures Regarding SW development with a focus on reuse of software components, the standard does not address the development of software-out-of-context. Safety is a matter that concerns the system as a whole. When software is going to be reused, the reused component has to fit into the safety concept of the system. There are two chapters in the standard that directly address SW reuse. These are the chapters and of Part 3 of the standard. They basically state that SW can be reused if either the SW has been developed in compliance with this standard or evidence can be provided that the SW is proven in use or the assessment of non-compliant development according to of Part 3 is positive. Furthermore the chapter C.2.10 of Part 7 of the standard addresses techniques and measures for the use of trusted/verified software elements ECSS-E-ST-40C and ECSS-Q-ST-80C (Space Domain) In any software project, both ECSS-E-40 and ECSS-Q-80 apply, and they complement each other. ECSS Q ST 80 specifies requirements to ensure the software is developed to perform as expected and safely in the operational environment meeting the quality objectives agreed for the project. ECSS-Q-ST-80 requires to identify the safety criticality classification, the methods and techniques for safety analysis, and the technical requirements for software, in relation to the overall aim at system level to protect flight and ground personnel, the launch vehicle, associated payloads, ground support equipment, the general public, public and private property, the space system and associated segments and the environment from hazards associated with European space systems. The supplier shall perform safety audits or reviews to verify compliance to project safety policy and requirements. In particular the supplier shall submit a safety data package to support reviews. The safety data package shall contain at least the following safety related documentation: The SafeCer Consortium 12 (41)

13 1. Safety analysis report; 2. Supporting analysis (if applicable); 3. Safety risk assessment (if applicable); 4. Hazardous ground operations list and procedures; 5. Safety verification tracking log (SVTL). The ECSS-M branch defines the requirements to be applied to the management of space projects. ECSS-E-ST-40 and ECSS-Q-ST-80 describe how the ECSS-M series of standards apply to the management of software projects. In addition, requirements that cannot be found in the M-branch because they are specific to software product assurance are defined in ECSS-Q-ST-80. In the ECSS no significant development process or requirements are addressed to the development of the software intended to be reused. For instance ECSS-E-ST-40 states that if the software is written for the reuse, then its provided functionality, from an external point of view, and its external interfaces must be documented. ECSS-E-ST-40 contains some specific clauses applicable to projects that intend to reuse software products from other space projects and third-party commercial off-the-shelf products to be part of the software product. In this respect, the ECSS-E-ST-40 makes reference to the Software Reuse File (SRF). The purpose of the SRF is to document the identification and analysis that is to be performed on existing software which is intended to be reused. The ECSS handbook (ECSS-Q-HB-80-01A) provides guidance on the approach that can be taken when defining the implementation of activities for the reuse of existing software within a space project. Existing software is defined in ECSS Q ST 80 as follows: Any software from previous developments that is used for the project development as is or with adaptation. It also includes software supplied by the customer for use in the project development. Any software including any software developed outside the contract to which ECSS software standards are applicable. Any software including products such as freeware and open source software products. The SafeCer Consortium 13 (41)

14 3.2 Comparison of the Other Domain Standards with IEC In this Chapter a comparison of the Standards for Healthcare, Industry and Space domain with the Standard IEC will be described Commonalities and differences for the Healthcare Domain In the healthcare domain, the reference standard for software is IEC Software is considered a subsystem of the medical device or is itself a medical device. This standard is to be used together with other appropriate standards when developing a medical device. Medical device management standards such as ISO and ISO provide a management environment that lays a foundation for an organization to develop products. Standards such as IEC and IEC give specific direction for creating safe medical devices. When software is a part of these medical device, IEC provides more detailed direction on what is required to develop and maintain safe medical device software. Many other standards such as ISO/IEC 12207, IEC and ISO/IEC can be looked at as a source of methods, tools and techniques that can be used to implement the requirements in IEC Figure 1 shows the relationship of these standards. Figure 1: Relationship of key medical device standards to IEC extracted extracted from [2] - Annex C. The SafeCer Consortium 14 (41)

15 The standard makes the following mention concerning the standard IEC 61508: The question has been raised whether this standard, being concerned with the design of SAFETYcritical software, should follow the principles of IEC The following explains the stance of this standard. IEC addresses 3 main issues: 1) RISK MANAGEMENT life cycle and life cycle PROCESSES; 2) definition of Safety Integrity Levels; 3) recommendation of techniques, tools and methods for software development and levels of independence of personnel responsible for performing different TASKS. Issue 1) is covered in this standard by a normative reference to ISO (the MEDICAL DEVICE sector standard for RISK MANAGEMENT). The effect of this reference is to adopt ISO s approach to RISK MANAGEMENT as an integral part of the software PROCESS for MEDICAL DEVICE SOFTWARE. For issue 2), this standard takes a simpler approach than IEC The latter classifies software into 4 Safety Integrity Levels defined in terms of reliability objectives. The reliability objectives are identified after RISK ANALYSIS, which quantifies both the severity and the probability of HARM caused by a failure of the software. This standard simplifies issue 2) by disallowing consideration of probability of software failure prior to classification. Classification into 3 software safety classes is based only on the severity of that HARM caused by a failure. After classification, different PROCESSES are required for different software safety classes: the intention is to further reduce the probability of failure of the software. Issue 3) is not addressed by this standard. Readers of the standard are encouraged to use IEC as a source for good software methods, techniques and tools, while recognizing that other approaches, both present and future, can provide equally good results. This standard makes no recommendation concerning independence of people responsible for one software ACTIVITY (for example VERIFICATION) from those responsible for another (for example design). In particular, this standard makes no requirement for an independent safety assessor, since this is a matter for ISO In summary, even if both IEC and IEC describe lifecycle related activities, IEC is more prescriptive than IEC specially in the measures/techniques to be applied in each stage. Software classification follows a different approach on IEC and IEC The latter is not probability aware. They share in common that they modulate lifecycle activity and documentation effort according to software classification. The remaining sections further describe differences and commonalities arranged in a way that will ease comparison with other domains High Level Process In medical domain, V-cycle is a reference but manufacturers can choose their own. IEC is similar to DO-178 in this sense. But in general, in terms of high-level process, it can be determined that the standards IEC and IEC are similar.iec requires a connection to a risk management process described in ISO In this sense, risk management plays the main role in the development in the same way as safety does for IEC The SafeCer Consortium 15 (41)

16 Integrated Safety or "External" Safety Systems The Risk Control Measures are defined in ISO (Medical devices Application of risk management to medical devices). ISO does not specify which architecture should be used, whether internal or external. Anyway, IEC implicitly assumes an integrated approach Objective-Oriented or Product-Oriented Approach Due to the increasing importance of software in medical devices, standards are undergoing a shift to take into account the software development process as experience has shown that exclusively paying attention to the product doesn t necessarily cover software related risk issues. Therefore, standards such as IEC aim to mitigate software related risks with an objective-oriented approach Severity and Assurance/Safety Integrity Levels As mentioned in the beginning of this chapter, the classification that IEC standard makes is different from IEC The safety class assigned to each software system shall be made according to the possible effects on the patient, operator, or other people resulting from a hazard to which the software system can contribute. The software safety classes shall initially be assigned based on severity as follows: Class A: No injury or damage to health is possible Class B: Non-serious injury is possible Class C: Death or serious injury is possible Besides, the source of failure is not categorized as in IEC 61508, there is not a mention for random hardware faults or systematic development faults. IEC mentions IEC as a reference but it doesn t mandate you follow a particular approach to avoid systematic faults Hazard and Risk Analysis and Tolerable Hazard Rate In order to perform this analysis, the standard ISO14971 should be followed. The concept of risk is the combination of the following two components: - the probability of occurrence of harm (where the definitions for probability can be different for different product families); - the consequences of that harm, i.e., how severe it might be. Parameter according to IEC /14971 Frequency of, and exposure time of hazardous situation Consequence of hazard Possibility of avoiding hazard Probability of the unwanted occurrence Not used Severity Risk Control Probability Table 1: Mapping of the parameters used to determine the safety integrity level (Healthcare) The SafeCer Consortium 16 (41)

17 Risk estimation can be quantitative or qualitative. In situations where sufficient data are available, a quantitative categorization of probability levels is preferred. If this is not possible, a qualitative description should be given. A good qualitative description is preferable to an inaccurate quantitative description Comparison and Consolidation of Functional Safety Standards: Current Initiatives Nothing to add. This section is kept to ease comparison with other domains Classification of Requirements in Standards with respect to Different Criteria In the standard IEC 62304, the methods, tools and techniques that can be used to implement the requirements defined in the standards are not defined, and it suggests other standards (including IEC 61508) as an information source Conclusions Although at a high level of comparison, IEC and IEC have a similar lifecycle based approach, IEC can not be grouped together with standards derived from IEC or with the avionics domain as software classification in IEC and Safety Integrity Levels in IEC not only have different definitions but also the implications in the development are handled differently. IEC isn t an standalone standard and must be applied in close collaboration with ISO and ISO not to mention collateral standards specific to each device type. Nevertheless, IEC provides a more demanding framework for safety software development and it could be argued that it can cover IEC requirements Commonalities and differences for the Industry Domain The IEC is already heavily referred to in D2.1.4/4.1.2 Chapter 3. Therefore, no additional commonalities or differences can be identified Commonalities and differences for the Space Domain The European Cooperation for Space Standardization (ECSS) is a cooperative effort of the European Space Agency, national space agencies and European industry associations for the development of a coherent, single set of user-friendly standards for use in all European space activities. The result of this effort is the ECSS series of standards (ST), handbooks (HB) and Technical Memoranda (TM) which are organized in four branches (M: Space project management; Q: Space product assurance; E: Space engineering; U: Space sustainability) under a global heading of ECSS-X-YY-ZZ where X stands for the branch of standardization, YY for the kind of document and ZZ for a number associated to a specific field. E.g: ECSS-Q-ST-80C means the Quality Standard for Software (revision C). See Figure 2 for a more detailed view of the ECSS branches and addressed disciplines. The SafeCer Consortium 17 (41)

18 Figure 2: ECSS Architecture (from ECSS website) The endorsement of ECSS as European Norm is currently in progress; currently there is no general policy or enforcements by laws regarding the adaption of the ECSS for the development of space systems. ECSS does not regard itself in any way as a certification authority; each European country is in charge to define the proper restriction rules about space installations and procedures. In the rest of this document the name ECSS is used to refer to the standard series, if not otherwise stated High Level Process One of the fundamental principles of the ECSS standard series, and distinctive difference compared to the standards from the other domains, is the explicit customer-supplier relationship, assumed for all system and software developments, where the supplier demonstrates compliance with the customer requirements and provides the specified evidence of compliance. How and which parts of the ECSS must be applied is specified through contract, in a way that depends on the given mission. In the ECSS the development of the software is always related to a complete space project and its different phases, with a strong focus on the integration with system level activities. The main software standard is ECSS-E-ST-40, part of the ECSS engineering branch (E). It covers all aspects of space software engineering, from requirements definition to retirement. It defines the scope of the space software engineering processes, including details of the verification and validation processes, and their interfaces with management and product assurance, which are addressed in the management (M) and product assurance (Q) branches of the ECSS system. The SafeCer Consortium 18 (41)

19 ECSS-E-ST-40 refers the ECSS-Q-ST-80 for the Software Product Assurance requirements related to the development and maintenance of software for Space Systems. Both two apply to any software project. According to the approach of ISO/IEC the ECSS-E-ST-40 provides a process model for the SW development activities, without prescribing a particular software life cycle Integrated Safety or "External" Safety Systems According to ECSS hazards that are not eliminated through design selection shall be reduced and made controllable through the use of automatic safety devices as part of the system, subsystem or equipment. However it is stated that software in automatic safety devices should be avoided, or justification for its usage shall be provided Process-Oriented or Product-Oriented ECSS is both a process-based and product- based framework, although more process-oriented as it takes origin from ISO/IEC In fact, ECSS is based on processes, and lets the user choose an own life-cycle and approach, with appropriate methods and tools. ECSS-Q-ST-80C does not impose constraints on the way software safety assurance issues must be addressed; it only requires that, during the definition of the project, a specific software safety assurance plan is prepared, where the customer and the supplier take care of a list of well identified topics. Such list depends on the criticality level of the considered software, e.g. in order to properly apply, in turn, subsequent software safety and dependability methods and techniques Categorizing Severity and Assurance/Safety Integrity Levels Space systems are required to be evaluated from the safety and dependability points of view, at early stages of their definition and partitioning, by assigning a criticality level (from A to D) to each of its components or subsystems, including the software components or subsystems. The criticality classification required by [ECSS-Q-40] and [ECSS-Q-30] is based on the severity of the consequences of system hazardous events and system failures. The severity categories (Catastrophic, Critical, Major and Minor/Negligible) are defined in a table which is shared by the two standards (see table 2). Safety is only concerned with the two highest levels of the severity scale, whereas dependability spans across the three lowest severity categories. The SafeCer Consortium 19 (41)

20 Severity Level Dependability (refer to ECSS-Q-ST-30) Extract from ECSS-Q-ST-30 Safety (ECSS-Q-ST-40) Catastrophic 1 Failures propagation Loss of life, life-threatening or permanently disabling injury or occupational illness; Loss of system; Loss of an interfacing manned flight system; Loss of launch site facilities; Severe detrimental environmental effects. Critical 2 Loss of mission Temporarily disabling but not lifethreatening injury, or temporary occupational illness; Major 3 Major mission degradation --- Minor or Negligible 4 Minor mission degradation or any other effect Major damage to interfacing flight system; Major damage to ground facilities; Major damage to public or private property; Major detrimental environmental effects. NOTE: When several categories can be applied to the system or system component, the highest severity takes priority --- Table 2: Severity of Consequences (Table extracted from ECSS-Q-ST-40C) The Common Notion of Safety in the Considered Standards No differences here to be outlined Hazard and Risk Analysis and Tolerable Hazard Rate In ECSS the hazard analysis is covered by ECSS-Q-ST-40-02C where the steps and tasks necessary to identify and classify hazards, and to achieve their reduction, are outlined. Table 3 below integrates the information provided in deliverable D214_D412-table1 by mapping the parameters of the generic standard IEC to the corresponding parameters of the ECSS, and so highlighting the different origins of these two standards. The SafeCer Consortium 20 (41)

21 Parameter according to IEC Frequency of, and exposure time of hazardous situation Consequence of hazard Possibility of avoiding hazard Probability of the unwanted occurrence ECSS Not used Severity Not used Not used Table 3: Mapping of the parameters used to determine the safety integrity level (Space) Regarding dependability, the probability targets concerning tolerable failure rates are explicitly mentioned in the standard itself, but their values are not defined. These targets are set on a project by project basis Other Commonalities and Differences in the Standards ECSS has the peculiarity of allowing the tailoring, on project-basis. No other standards envisage this by rule. Tailoring means that on a project-basis, and hierarchically in the chain, each Customer may determine the applicable ECSS standards and requirements therein, for his own Suppliers. This tailoring must be justified, coherent, and consistent throughout the Customer-Supplier chain, and always be visible to the higher level Customer. ECSS E-ST-40C and Q-ST-80C contain criticality-driven applicability tables, fully equivalent to those provided by the standards above. As usual, in such tables each requirement is made applicable or not according to the criticality level of the concerned software. The difference lies in the fact that such tables actually represent an indication only (namely, suggested criticality-driven tailoring). On a project basis they may be waived Classification of Requirements in Standards with respect to Different Criteria Methods, techniques and tools are covered by ECSS Handbooks. Handbooks are not standards and thus they are not normative. However, they contain requirements and suggestions that, on a project basis, may be incorporated and made applicable. Sometimes handbooks contain requirements in beta-test. These latter, once consolidated and reviewed, are then incorporated in new (or updated) standards. Similarly to topics covered in DO-178C Technology Supplements (e.g. DO-331[9]), some subjects are actually covered in ECSS standards or handbooks (namely Modeldriven, tool qualification and auto-code matters); However, not as exhaustive and not in a restrictive way as in DO-178C Conclusions ECSS has different origin than IEC 61508, so they share very little similarities. ECSS can be grouped into the avionics domain class. ECSS in fact cites several other standards (e.g. ISO/IEC 12207). However the only domain-specific standard (not ISO, not IEC, not IEEE) that is cited in the bibliography, and multiply taken into account, is the ED-12B/DO-178B. The SafeCer Consortium 21 (41)

22 4 Reuse of Components in Other Domains The focus of this chapter is on the reuse of components put forward by the domain-specific standards. Reuse of components can be achieved in different forms and follows different lines, from small building blocks to large complex applications, and the way this reuse is handled in the different domains also varies. The chapter is split between the sections on safety-case aspects, application re-use, qualification, proven in use, and product lines. Figure 3 below is taken from the ECSS Q HB 80 01A (the ECSS handbook covering Reuse of existing software) and shows the following phases that should be performed for each reused existing software item, also taking into account the relationship with the project input/output and the role of the customer: Requirements phase definition of the requirements to be fulfilled by the existing software candidates by requirements identification, gap analysis and definition of derived requirements. Assessment phase selection and justification of the best choice according to the identified requirements from the previous phase and identification of corrective actions. Integration Phase acquisition, inspection, adaptation, configuration management of the selected reused existing software into the system software of the project. Qualification Phase qualification activities performed on the existing software reused in parallel to current software development. Figure 3: Reuse activities The SafeCer Consortium 22 (41)

23 4.1 Healthcare Domain - IEC and IEC Introduction There are three components to distinguish in terms of reuse according to IEC 62304: - Software item: any identifiable part of a computer program - Software system: integrated collection of software organized to accomplish a specific function or set of functions. - SOUP: Software Of Unknown Provenance (acronym): software that is already developed and generally available and that has not been developed for the purpose of being incorporated into the medical device (also known as off-the-shelf software ) or software previously developed for which adequate records of the development processes are not available SOUP should not be confused with ISO Safety Element out of Context definition. In the following chapters the reuse approaches are described according to the component type Handling of Safety Case and Evidence for reuse of Software Medical devices industry uses a Risk Management File instead of a safety case, although they are not directly equivalent. The ISO is the standard for application of risk management to medical devices, and the technical report IEC/TR guides on the application of ISO to medical device software. The standard doesn t mention the reuse of components, but according to technical report IEC/TR a reused component should be treated as SOUP. In addition, the following procedures must be done: Software development process: A software development plan shall be established in order to achieve the fixed scope. This plan has to include the following information: - software configuration and change management, including SOUP configuration items and software used to support development - the standard, methods and tools - integration and integration testing planning (also including SOUP) and verification planning - a risk management process (Risk Management File). These all documentation shall be properly referenced (title, responsible, purpose, etc). The items to be controlled shall include tools, items or settings, used to develop the medical device software, which could impact the medical device software. The interfaces between items (even sw or hw, or SOUP) must be identified, as well as the proper operation of the SOUP item. Software maintenance process: A maintenance plan must be defined, where the risk of modification of items (including SOUP) must be defined. Software risk management process: The items that could contribute to a hazardous situation must be identified and implement risk control measures to control or avoid them. The causes can be: a) incorrect or incomplete specification of functionality; b) software defects in the identified software item functionality; The SafeCer Consortium 23 (41)

24 c) failure or unexpected results from SOUP; d) hardware failures or other software defects that could result in unpredictable software operation; and e) reasonably foreseeable misuse. These control measures must be also verified. When changes are made in items (including the SOUP) the risk that this could arise must be taken into account. Software configuration management process: All the configuration must be identified properly and changes must be controlled Reuse of Safety related subsystems and components As mentioned in Chapter 4.1.2, different measures should be taken when reusing components Reusing SOUP If the software component to reuse is a SOUP, the following steps should be followed: Software development process: - Development plan: The SOUP must be included in the configuration management together with the other items. The SOUP should be in the integration plan. The SOUP should be taken into account when carrying out the risk management development. - Software requirements analysis: The SOUP requirements should be taken into account. - Software architectural design: The functional and performance requirements for the SOUP item shall be specified as well as the system hardware and software required by the SOUP. Software maintenance process: Establish a software maintenance plan where upgrades, bug fixes, patches and obsolescence of SOUP are evaluated Software risk management process: If failure or unexpected results from SOUP is a potential cause of the software item contributing to a hazardous situation, the list of anomalies published by the supplier shall be evaluated. to determine if any of the known anomalies result in a sequence of events that could result in a hazardous situation. Software configuration management process: The following information shall be documented for each SOUP configuration item being used: a) the title, b) the manufacturer, and c) the unique SOUP designator The SafeCer Consortium 24 (41)

25 Reusing software item If the software component to reuse is a software item, for example a software component that is already used in a certified product, the following records are needed (besides the ones defined in the Chapter 4.1.2): - Component classification - Software detailed design - Software unit implementation and verification - Software integration and integration testing If reusing this type of item, it is supposed that the records already exist Qualifications IEC does not specify neither software component nor tool qualification requirements for reuse. Software reuse needs to take the SOUP approach, and this implies that previous evidence is not a guarantee for next developments or products. Tool qualification isn t specifically mentioned although it can be implicitly understood from a risk management perspective that verification activities are required if a hazardous situation can arise from a tool usage Proven In Use As mentioned in 4.1.4, the concept proven in use does not apply to software components but it could be used for providing evidence for tools Handling Product lines Nowadays product lines of medical equipment in general and in particular defibrillators share several features together. In the case of Osatu defibrillator products, each model has its own set of functional features, and it shares many of them with other models. Usually, those shared features are core product features and main differences remain in the GUI. The purpose is to identify the components that could make them independent from the environment so they can be easily integrated in other platforms or products. The SafeCer Consortium 25 (41)

26 4.2 Industry Domain - IEC 61508, IEC 61511, IEC Introduction Chapter of Part 3 of the IEC directly addresses the topic of pre-existing software. The concept of SWooC (software out of context) does not exist in the IEC 61508, but a proper modular software design approach with a clear separation of concerns will fulfill the same goal. Besides the software code itself, reuse may comprise all development process artifacts, the safety manual as well as the testing artifacts Handling of Safety Case and Evidence for reuse of Software The term Safety Case does not exist in the IEC On the other hand the term Functional Safety exists, which determines the part of the overall safety relating to the Equipment under Control (EUC) and the EUC control system that depends on the correct functioning of the E/E/PE safety-related systems and other risk reduction measures. So putting the focus on SW components the safety case can be considered as satisfying Functional Safety for the SW component to be reused with respect to the overall safety case of the system. Depending on the reusability factor only a subset of the evidence artifacts or all evidence artifacts can be reused. There no mechanism for a separate artifact which only considers the reuse aspects Reuse of Safety related subsystems and components For SW reuse the IEC61508 part 3 chapter the preconditions to be met are defined. According to part 3 pre-existing SW can be reused when the following requirements for systematic safety integrity are met: a) One of the following requirements are met: a. The pre-existing SW component has been developed compliant to this standard and the desired safety integrity level b. The pre-existing SW component can be considered as proven in use. c. If the development has been done non-compliant evidence has to be shown that the development process used can be seen as equivalent to that of this standard. Detailed description of this process can be found in chapter of IEC61508 part 3. b) Provide a safety manual that gives a sufficiently precise and complete description of the SW component to make possible an assessment of the integrity of a specific function that depends wholly or partly on the pre-existing SW component Qualification Depending on the context the term qualification is used, two cases can be distinguished: a) Qualification as the process of showing evidence that a pre-existing SW component may be reused in a safety-related system. This has been already described in chapter b) Qualification as the process of proper tool selection for tools for development support. Here again two cases can be distinguished: The SafeCer Consortium 26 (41)

27 a. Software on-line Tool. The standard defines a tool as on-line if the tool can directly influence safety during its run time. In case the tool has to be seen as SW element of the safety-related system and therefore tool development has to follow the same process as any SW component of a safety-related system. b. Software off-line Tool. The standard defines a tool as off-line tool if the tool cannot directly influence the safety-related system during its run time. For off-line tools three severity levels exists. The severity level is derived from the influence of the tools output to the safety-related system. Depending on the severity level the qualification effort increases. While for a T1 level tool almost no documentation and validation has to be provided, T3 requires providing proper product documentation, evidence that the tool conforms to its specification and validation Proven In Use Proven in use is detailed in the IEC The chapter part 3 Pre-existing SW addresses this topic. A SW component can be seen as proven in use if evidence can be provided that the previous conditions of use of the SW component are the same as those that will be experienced by the element in the E/E/PE safety-related system and the dangerous failure rate has not been exceeded in previous use. If there are differences between the previous conditions of use and those that will be experienced in the E/E/PE safety-related system, then an impact analysis has to prove the required safety integrity level of the safety functions that use the SW component is achieved (more detailed description can be found in chapter of IEC61508 part 2) Handling Product lines Companies more and more try to base product lines to reusable software components on the basis of a generic software platform. A software platform usually is a set of modules used for a certain product line. As the products in the product line may slightly differ, scalable software platforms give the companies the advantage of utilizing modularization and variability for adding or removing features from product variants. Reusability of software components and their certification evidence save a lot of certification costs as usually the integrity level does not differ within the product line. This usually justifies possible higher development costs for scalable software platforms. Support for product lines is not explicitly stated in the IEC Strategies for reuse Reuse within the scope of IEC follows the lines indicated in the previous chapters, i.e. focusing on a modular software design approach and the possibility to utilize software platforms. In order to plan strategies for reuse, it is therefore necessary to identify those sections of software that might be reused in the future and to set up the modularity of the software design in such a form that it supports the integration of components from different sources. These sources entail: - Standard and SIL-level compliant previously developed components - Proven-in-use components - Equivalency-compliant developed components In addition, the utilization of a safety manual that specifies the scope of the functional safety aspects of a software component (i.e. under which preconditions will the component behave safely) allows for the assessment of the integrity of each function. The SafeCer Consortium 27 (41)

28 4.3 Space Domain - ECSS-E-ST-40C and ECSS-Q-ST-80C Introduction Different existing software artifacts can be considered for reuse in each application engineering processes: requirements analysis, design, coding, integration, testing, installation, maintenance and operations. Therefore, there are specific activities that should be performed at a very early phase of the project in order to ensure that the most suitable existing software is considered for reuse in the current application. The suppliers should assess different options relevant to reuse and new development, evaluating them with respect to criteria such as risks, cost and benefits. These options include: a. Purchase an off-the-shelf, COTS software (no source code available) that satisfies the requirements b. Develop the software product or obtain the software service internally c. Develop the software product or obtain the external software service through contract d. Use open source software products that satisfies the requirements e. A combination of a, b, c and d above f. Enhance an existing software product or service Choosing between creating the software in-house or reusing existing software is not an easy decision. This choice should be made very early in the project, when often there is still no information about the full set of functionalities nor the design. Only when systematic reuse is an established policy in an organization, reusing existing software can be the starting approach in any project. The organization would have the reuse-related processes deployed (see [ISO12207]) and any project would first access the library of existing reusable products to check for any one that could fit into the project concerned. Nevertheless, no matter what the organizational situation is, a systems approach should be taken to consider how the existing software will fit into the new software application to be developed Handling of Safety Case and Evidence for reuse of Software The term safety case is not explicitly mentioned by the ECSS, however it can be considered as resulting from the conformance to the ECSS-Q-ST-80C product assurance and ECSS-Q-ST-40C safety standards. In particular the ECSS-Q-ST-40C refers to the safety data package (see Chapter 3.2.3) as the collection of all the information produced during the safety-related processes which each supplier participating in a safety review shall prepare, and submit for review. Regarding reuse, a single Software Reuse File (SRF) document is expected to cover ALL the reused existing software foreseen in the context of a software project, but it may be appropriate to produce specific SRFs targeted to individual existing software products when they are large, numerous or complex. The SRF should present the existing SW elements candidates and their suppliers, describing both technical and management information of the elements to be reused; a gap analysis should be included that covers the different development phases and more relevant characteristics (performance, code quality, size of code ). Finally a reasoned conclusion with a Reuse Qualification Plan is presented. It should be noted that documentation concerning reused or existing software is not simply limited to the SRF. There are software requirements that call for adequate planning concerning reused software to be present in the software development, software configuration management, software product assurance and software verification and validation plans. Furthermore, it is clear that The SafeCer Consortium 28 (41)

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL 61508-3 ª IEC: 1997 1 Version 12.0 05/12/97 COMMISSION CEI ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL COMMISSION Functional safety of electrical/electronic/ programmable

More information

IEC 61508 Overview Report

IEC 61508 Overview Report IEC 61508 Overview Report A Summary of the IEC 61508 Standard for Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems exida Sellersville, PA 18960, USA +1-215-453-1720

More information

Mission Operation Ground. Assurance @ ESA. Mario Merri GSAW, Los Angeles, USA 2 Mar 2011 ESA UNCLASSIFIED

Mission Operation Ground. Assurance @ ESA. Mario Merri GSAW, Los Angeles, USA 2 Mar 2011 ESA UNCLASSIFIED Mission Operation Ground Software Systems Product Assurance @ ESA Mario Merri GSAW, Los Angeles, USA 2 Mar 2011 The European Cooperation for Space Standardisation (ECSS) Established: in 1993 Goal: coherent,

More information

How to Upgrade SPICE-Compliant Processes for Functional Safety

How to Upgrade SPICE-Compliant Processes for Functional Safety How to Upgrade SPICE-Compliant Processes for Functional Safety Dr. Erwin Petry KUGLER MAAG CIE GmbH Leibnizstraße 11 70806 Kornwestheim Germany Mobile: +49 173 67 87 337 Tel: +49 7154-1796-222 Fax: +49

More information

Space product assurance

Space product assurance Space product assurance Software dependability and safety ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Handbook is one document of the series of

More information

Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.

Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes. Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC

More information

Medical Device Software Standards for Safety and Regulatory Compliance

Medical Device Software Standards for Safety and Regulatory Compliance Medical Device Software Standards for Safety and Regulatory Compliance Sherman Eagles +1 612-865-0107 seagles@softwarecpr.com www.softwarecpr.com Assuring safe software SAFE All hazards have been addressed

More information

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when

More information

CONSOLIDATED VERSION IEC 62304. Medical device software Software life cycle processes. colour inside. Edition 1.1 2015-06

CONSOLIDATED VERSION IEC 62304. Medical device software Software life cycle processes. colour inside. Edition 1.1 2015-06 IEC 62304 CONSOLIDATED VERSION Edition 1.1 2015-06 colour inside Medical device software life cycle processes INTERNATIONAL ELECTROTECHNICAL COMMISSION ICS 11.040 ISBN 978-2-8322-2765-7 Warning! Make sure

More information

Controlling Risks Safety Lifecycle

Controlling Risks Safety Lifecycle Controlling Risks Safety Lifecycle Objective Introduce the concept of a safety lifecycle and the applicability and context in safety systems. Lifecycle Management A risk based management plan for a system

More information

Hardware safety integrity Guideline

Hardware safety integrity Guideline Hardware safety integrity Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se Quoting of this report is allowed

More information

SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT

SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND Queensland 4072 Australia TECHNICAL REPORT No. 99-30 A Survey of International Safety Standards Axel

More information

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter.

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter. 61508 SIL 3 CAPABLE IEC 61508 Functional Safety Assessment Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter Customer: K-TEK Corporation Prairieville, LA USA Contract No.:

More information

Is your current safety system compliant to today's safety standard?

Is your current safety system compliant to today's safety standard? Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before

More information

Version: 1.0 Latest Edition: 2006-08-24. Guideline

Version: 1.0 Latest Edition: 2006-08-24. Guideline Management of Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se Quoting of this report is allowed but please

More information

Space project management

Space project management ECSS-M-ST-80C Space project management Risk management ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

A Quality Requirements Safety Model for Embedded and Real Time Software Product Quality

A Quality Requirements Safety Model for Embedded and Real Time Software Product Quality A Quality Requirements Safety Model for Embedded and Real Time Product Quality KHALID T. AL-SARAYREH Department of Engineering Hashemite University Zarqa 13115, Jordan khalidt@hu.edu.jo Abstract safety

More information

Reducing Steps to Achieve Safety Certification

Reducing Steps to Achieve Safety Certification Reducing Steps to Achieve Safety Certification WP-01174-1.0 White Paper This white paper describes the successful steps in achieving certification for an FPGA implementation of an application certified

More information

Software-based medical devices from defibrillators

Software-based medical devices from defibrillators C O V E R F E A T U R E Coping with Defective Software in Medical Devices Steven R. Rakitin Software Quality Consulting Inc. Embedding defective software in medical devices increases safety risks. Given

More information

EWICS London, January 18, 2005 BSI. Safety-Related Security. Concepts 17.03.2005-1

EWICS London, January 18, 2005 BSI. Safety-Related Security. Concepts 17.03.2005-1 EWICS London, January 18, 2005 Safety-Related Security Concepts - 1 Safety Requirements Top-level requirements for the PES: functional behavior System Safety depends on other attributes, i.e.: accuracy

More information

2015. All rights reserved.

2015. All rights reserved. DOCUMENT: Future AAMI/IEC 62304:2006/AMD1, 18-August-2015 Final Draft International Standard for Vote, Amendment 1 to IEC 62304: Medical device software Software life cycle processes. Public Review Draft

More information

Certified Professional in Configuration Management Glossary of Terms

Certified Professional in Configuration Management Glossary of Terms Certified Professional in Configuration Management Glossary of terms used in Configuration Management Issue 2007.07 Association of the International Certified Configuration Manager e.v. Copyright 2007,

More information

How To Write Software

How To Write Software 1 Medical Device Software - Software Life Cycle Processes IEC 62304 2 Credits John F. Murray Software Compliance Expert U.S. Food and Drug Administration Marcie R. Williams Medical Device Fellow Ph.D.

More information

Space engineering. Software engineering handbook. ECSS-E-HB-40A 11 December 2013

Space engineering. Software engineering handbook. ECSS-E-HB-40A 11 December 2013 Space engineering Software engineering handbook ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Handbook is one document of the series of ECSS Documents

More information

Space product assurance

Space product assurance ECSS-Q-ST-80C Space product assurance Software product assurance ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS

More information

Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation

Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation Despite significant efforts to improve engineering practices and technologies,

More information

Testing of safety-critical software some principles

Testing of safety-critical software some principles 1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6

More information

ECSS-E-ST-40C 6 March 2009. Space engineering. Software. ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands

ECSS-E-ST-40C 6 March 2009. Space engineering. Software. ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands ECSS-E-ST-40C Space engineering Software ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards intended to

More information

8. Master Test Plan (MTP)

8. Master Test Plan (MTP) 8. Master Test Plan (MTP) The purpose of the Master Test Plan (MTP) is to provide an overall test planning and test management document for multiple levels of test (either within one project or across

More information

ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY

ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY Dr. Qi Van Eikema Hommes SAE 2012 Government/Industry Meeting January 25, 2012 1 Outline ISO 26262 Overview Scope of the Assessment

More information

Reduce Medical Device Compliance Costs with Best Practices. mark.pitchford@ldra.com

Reduce Medical Device Compliance Costs with Best Practices. mark.pitchford@ldra.com Reduce Medical Device Compliance Costs with Best Practices mark.pitchford@ldra.com 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises

More information

SOFTWARE QUALITY MANAGEMENT THROUGH IMPLEMENTATION OF SOFTWARE STANDARDS

SOFTWARE QUALITY MANAGEMENT THROUGH IMPLEMENTATION OF SOFTWARE STANDARDS 4 th Int. Conf. CiiT, Molika, Dec.11-14, 2003 61 SOFTWARE QUALITY MANAGEMENT THROUGH IMPLEMENTATION OF SOFTWARE STANDARDS S. Grceva, Z. Zdravev Faculty for Education Goce Delcev, University of Sts. Cyril

More information

Introduction into IEC 62304 Software life cycle for medical devices

Introduction into IEC 62304 Software life cycle for medical devices Introduction into IEC 62304 Software life cycle for medical devices Christoph Gerber 4. September 2008 SPIQ 9/5/2008 1 Agenda Current Picture Regulatory requirements for medical device software IEC 62304

More information

SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.

SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions. SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.com DIGITAL FLIGHT / SOLUTIONS Presentation Outline DO-178 Overview

More information

An Introduction to the ECSS Software Standards

An Introduction to the ECSS Software Standards An Introduction to the ECSS Software Standards Abstract This introduces the background, context, and rationale for the creation of the ECSS standards system presented in this course. Addresses the concept

More information

Verification and Validation of Software Components and Component Based Software Systems

Verification and Validation of Software Components and Component Based Software Systems Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research christina.wallin@mdh.se

More information

Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)

Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The exida Certification Program Functional Safety (SIL) Cyber-Security V2 R3 June 14, 2012 exida Sellersville, PA 18960, USA, +1-215-453-1720 Munich, Germany, +49 89 4900 0547

More information

Software Engineering Compiled By: Roshani Ghimire Page 1

Software Engineering Compiled By: Roshani Ghimire Page 1 Unit 7: Metric for Process and Product 7.1 Software Measurement Measurement is the process by which numbers or symbols are assigned to the attributes of entities in the real world in such a way as to define

More information

When Your Life Depends on Software

When Your Life Depends on Software Published on Quality Digest (http://www.qualitydigest.com) Home > Content When Your Life Depends on Software IEC 62304 imposes requirements on software for medical devices. We re all aware of the importance

More information

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity Value Paper Author: Edgar C. Ramirez Diverse redundancy used in SIS technology to achieve higher safety integrity Diverse redundancy used in SIS technology to achieve higher safety integrity Abstract SIS

More information

Software Quality Assurance: VI Standards

Software Quality Assurance: VI Standards Software Quality Assurance: VI Standards Room E 3.165 Tel. 60-3321 Email: hg@upb.de Outline I Introduction II Software Life Cycle III Quality Control IV Infrastructure V Management VI Standards VII Conclusion

More information

ISO 26262 Introduction

ISO 26262 Introduction ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product

More information

Safety-Critical Systems: Processes, Standards and Certification

Safety-Critical Systems: Processes, Standards and Certification Fachbereich 17 - Mathematik/Informatik Arbeitsgruppe Softwaretechnik Warburger Straße 100 33098 Paderborn Safety-Critical Systems: Processes, Standards and Certification for the Seminar Analysis, Design

More information

Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level

Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level ISO 26262 the Emerging Automotive Safety Standard Agenda Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 4 : Product Development System Level Part 6 : Product Development

More information

Meta-Model specification V2 D602.012

Meta-Model specification V2 D602.012 PROPRIETARY RIGHTS STATEMENT THIS DOCUMENT CONTAINS INFORMATION, WHICH IS PROPRIETARY TO THE CRYSTAL CONSORTIUM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN SHALL BE USED, DUPLICATED OR

More information

Software Quality. Software Quality Assurance and Software Reuse. Three Important Points. Quality Factors

Software Quality. Software Quality Assurance and Software Reuse. Three Important Points. Quality Factors Software Quality Software Quality Assurance and Software Reuse Peter Lo Conformance to explicitly-stated functional and performance requirements, explicitly-documented development standards, and implicit

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The exida 61508 Certification Program V1 R8 October 19, 2007 exida Geneva, Switzerland Sellersville, PA 18960, USA, +1-215-453-1720 Munich, Germany, +49 89 4900 0547 1 Exida

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems. Chris Hobbs, Senior Developer, Safe Systems

When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems. Chris Hobbs, Senior Developer, Safe Systems When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems Chris Hobbs, Senior Developer, Safe Systems 2 Audience and Assumptions Who will benefit from this presentation? Software designers

More information

Lecture 8 About Quality and Quality Management Systems

Lecture 8 About Quality and Quality Management Systems Lecture 8 About Quality and Quality Management Systems Kari Systä 10.03.2014 10.03.2014 TIE-21100/21106; K.Systä 1 Content of today s lecture Two weeks ago we discussed about testing and inspections, that

More information

Medical Software Development. International standards requirements and practice

Medical Software Development. International standards requirements and practice Medical Software Development International standards requirements and practice Food and Drug Administration What? A public health agency Why? Protect American consumers How? By enforcing the Federal Food,

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

What is ISO/IEC 15288? (A Concise Introduction)

What is ISO/IEC 15288? (A Concise Introduction) Dr. Harold "Bud" Lawson 2004-10-13 1 (10) What is ISO/IEC 15288? (A Concise Introduction) What if all or the majority of the people of an organization (independent of their personal background and role)

More information

PUBLICLY AVAILABLE SPECIFICATION PRE-STANDARD

PUBLICLY AVAILABLE SPECIFICATION PRE-STANDARD IEC/PAS 62443-3 PUBLICLY AVAILABLE SPECIFICATION PRE-STANDARD Edition 1.0 2008-01 Security for industrial process measurement and control Network and system security INTERNATIONAL ELECTROTECHNICAL COMMISSION

More information

CHAPTER 01 THE SCOPE OF SOFTWARE ENGINEERING

CHAPTER 01 THE SCOPE OF SOFTWARE ENGINEERING Lecture Software Engineering CHAPTER 01 THE SCOPE OF SOFTWARE ENGINEERING Lecture Software Engineering Topics Introduction Historical Aspects Economic Aspects Requirements, Analysis, and Design Aspects

More information

SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK

SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK Office of Safety and Mission Assurance NASA-GB-9503 SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK AUGUST 1995 National Aeronautics and Space Administration Washington, D.C. 20546 PREFACE The growth in cost

More information

Software Classification Methodology and Standardisation

Software Classification Methodology and Standardisation Software Classification Methodology and Standardisation 07 March 2003 1/10 Table of Contents 1. INTRODUCTION a Galileo system overview Ε b Master schedule Ε 2. GALILEO SAFETY CASE APPROACH Ε 3. SYSTEM

More information

ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview

ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview Barbara J. Czerny, Joseph D Ambrosio, Rami Debouk, General Motors Research and Development Kelly

More information

SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR

SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR The information and any recommendations that may be provided herein are not intended

More information

Software in safety critical systems

Software in safety critical systems Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions

More information

DRAFT REGULATORY GUIDE

DRAFT REGULATORY GUIDE U.S. NUCLEAR REGULATORY COMMISSION August 2012 OFFICE OF NUCLEAR REGULATORY RESEARCH Division 1 DRAFT REGULATORY GUIDE Contact: K. Sturzebecher (301) 251-7494 DRAFT REGULATORY GUIDE DG-1206 (Proposed Revision

More information

Criteria for Flight Project Critical Milestone Reviews

Criteria for Flight Project Critical Milestone Reviews Criteria for Flight Project Critical Milestone Reviews GSFC-STD-1001 Baseline Release February 2005 Approved By: Original signed by Date: 2/19/05 Richard M. Day Director, Independent Technical Authority

More information

Design of automatic testing tool for railway signalling systems software safety assessment

Design of automatic testing tool for railway signalling systems software safety assessment Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research

More information

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing

More information

System Development Life Cycle Guide

System Development Life Cycle Guide TEXAS DEPARTMENT OF INFORMATION RESOURCES System Development Life Cycle Guide Version 1.1 30 MAY 2008 Version History This and other Framework Extension tools are available on Framework Web site. Release

More information

Certification Authorities Software Team (CAST) Position Paper CAST-13

Certification Authorities Software Team (CAST) Position Paper CAST-13 Certification Authorities Software Team (CAST) Position Paper CAST-13 Automatic Code Generation Tools Development Assurance Completed June 2002 NOTE: This position paper has been coordinated among the

More information

Clinical Risk Management: Agile Development Implementation Guidance

Clinical Risk Management: Agile Development Implementation Guidance Document filename: Directorate / Programme Document Reference NPFIT-FNT-TO-TOCLNSA-1306.02 CRM Agile Development Implementation Guidance v1.0 Solution Design Standards and Assurance Project Clinical Risk

More information

Software Test Plan (STP) Template

Software Test Plan (STP) Template (STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This

More information

IBM Rational Rhapsody

IBM Rational Rhapsody IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated

More information

Chapter 8 Software Testing

Chapter 8 Software Testing Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is

More information

3SL. Requirements Definition and Management Using Cradle

3SL. Requirements Definition and Management Using Cradle 3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification

More information

CASS TEMPLATES FOR SOFTWARE REQUIREMENTS IN RELATION TO IEC 61508 PART 3 SAFETY FUNCTION ASSESSMENT Version 1.0 (5128)

CASS TEMPLATES FOR SOFTWARE REQUIREMENTS IN RELATION TO IEC 61508 PART 3 SAFETY FUNCTION ASSESSMENT Version 1.0 (5128) CASS TEMPLATES FOR SOFTWARE REQUIREMENTS IN RELATION TO PART 3 SAFETY FUNCTION ASSESSMENT Version 1.0 (5128) Report No. T6A01 Prepared for: The CASS Scheme Ltd By: The 61508 Association All comment or

More information

V-Modell XT. Part 1: Fundamentals of the V-Modell

V-Modell XT. Part 1: Fundamentals of the V-Modell V-Modell XT Part 1: Fundamentals of the V-Modell THE V-MODELL XT IS PROTECTED BY COPYRIGHT. BUNDESREPUBLIK DEUTSCHLAND 2004. ALL RIGHTS RESERVED. COPYRIGHT RESERVED BUNDESREPUBLIK DEUTSCHLAND 2004.THE

More information

Functional Safety Hazard & Risk Analysis

Functional Safety Hazard & Risk Analysis Embedded - IC & Automation Fortronic Functional Safety Hazard & Risk Analysis MILANO - April, 23 rd 2013 CEFRIEL 2013; FOR DISCUSSION PURPOSES ONLY: ANY OTHER USE OF THIS PRESENTATION - INCLUDING REPRODUCTION

More information

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director

System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical

More information

IBM Rational systems and software solutions for the medical device industry

IBM Rational systems and software solutions for the medical device industry IBM Software August 2011 IBM Rational systems and software solutions for the medical device industry Improve processes, manage IEC 61508 and IEC 62304 standards, develop quality products Highlights Manage

More information

Application of software product quality international standards through software development life cycle

Application of software product quality international standards through software development life cycle Central Page 284 of 296 Application of software product quality international standards through software development life cycle Mladen Hosni, Valentina Kirinić Faculty of Organization and Informatics University

More information

TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification

TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification The TÜV Rheinland Functional Safety Program is a unique opportunity to provide certified evidence of competency in functional

More information

Space Project Management

Space Project Management EUROPEAN COOPERATION FOR SPACE STANDARDIZATION Space Project Management Information/Documentation Management Secretariat ESA ESTEC Requirements & Standards Division Noordwijk, The Netherlands Published

More information

WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE

WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE White paper produced by Maetrics For more information, please contact global sales +1 610 458 9312 +1 877 623 8742 globalsales@maetrics.com

More information

Functional Safety Management: As Easy As (SIL) 1, 2, 3

Functional Safety Management: As Easy As (SIL) 1, 2, 3 Functional Safety Management: As Easy As (SIL) 1, 2, 3 Abstract This paper outlines the need for planning in functional safety management. Recent events such as the Montara blowout and the Deepwater Horizon

More information

Quality Management. Lecture 12 Software quality management

Quality Management. Lecture 12 Software quality management Quality Management Lecture 12 Software quality management doc.dr.sc. Marko Jurčević prof.dr.sc. Roman Malarić University of Zagreb Faculty of Electrical Engineering and Computing Department of Fundamentals

More information

RECOMMENDED GUIDELINES FOR THE APPLICATION OF IEC 61508 AND IEC 61511 IN THE PETROLEUM ACTIVITIES ON THE NORWEGIAN CONTINENTAL SHELF

RECOMMENDED GUIDELINES FOR THE APPLICATION OF IEC 61508 AND IEC 61511 IN THE PETROLEUM ACTIVITIES ON THE NORWEGIAN CONTINENTAL SHELF RECOMMENDED GUIDELINES FOR THE APPLICATION OF IEC 61508 AND IEC 61511 IN THE PETROLEUM ACTIVITIES ON THE NORWEGIAN CONTINENTAL SHELF No.: 070 Date effective: 1.02.2001 Revision no.: 01 Date revised: NA

More information

FMEDA and Proven-in-use Assessment. Pepperl+Fuchs GmbH Mannheim Germany

FMEDA and Proven-in-use Assessment. Pepperl+Fuchs GmbH Mannheim Germany FMEDA and Proven-in-use Assessment Project: Inductive NAMUR sensors Customer: Pepperl+Fuchs GmbH Mannheim Germany Contract No.: P+F 03/11-10 Report No.: P+F 03/11-10 R015 Version V1, Revision R1.1, July

More information

On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment

On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment Legislation, Standards and Technology On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment Assistance for equipment manufacturers in analysis and assessment by Michael

More information

TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW

TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW Year 2014, Vol. 1, issue 1, pp. 49-56 Available online at: http://journal.iecuniversity.com TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW Singh RANDEEP a*, Rathee AMIT b a* Department of

More information

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Guide to Enterprise Life Cycle Processes, Artifacts, and Reviews

Guide to Enterprise Life Cycle Processes, Artifacts, and Reviews Department of Health and Human Services Centers for Medicare & Medicaid Services Center for Consumer Information and Insurance Oversight Guide to Enterprise Life Cycle Processes, Artifacts, and Reviews

More information

IEC 61508 Functional Safety Assessment. ASCO Numatics Scherpenzeel, The Netherlands

IEC 61508 Functional Safety Assessment. ASCO Numatics Scherpenzeel, The Netherlands IEC 61508 Functional Safety Assessment Project: Series 327 Solenoid Valves Customer: ASCO Numatics Scherpenzeel, The Netherlands Contract No.: Q09/04-59 Report No.: ASC 09-04-59 R003 V1 R3 61508 Assessment

More information

<name of project> Software Project Management Plan

<name of project> Software Project Management Plan The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor

More information

An Overview of IEEE Software Engineering Standards and Knowledge Products

An Overview of IEEE Software Engineering Standards and Knowledge Products Paul R. Croll Chair, IEEE SESC Computer Sciences Corporation pcroll@csc.com An Overview of IEEE Software Engineering Standards and Knowledge Products Objectives Provide an introduction to The IEEE Software

More information

Viewpoint on ISA TR84.0.02 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President

Viewpoint on ISA TR84.0.02 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President Viewpoint on ISA TR84.0.0 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President Presented at Interkama, Dusseldorf, Germany, October 1999, Published in ISA Transactions,

More information

Darshan Institute of Engineering & Technology Unit : 7

Darshan Institute of Engineering & Technology Unit : 7 1) Explain quality control and also explain cost of quality. Quality Control Quality control involves the series of inspections, reviews, and tests used throughout the software process to ensure each work

More information

Space engineering. System engineering. ECSS-E-10 C Draft 1

Space engineering. System engineering. ECSS-E-10 C Draft 1 Space engineering System engineering This ECSS document is a draft standard distributed for Public Review. It is therefore subject to change without any notice and may not be referred to as an ECSS Standard

More information