Figure 6: Example.
enables the use of a specific Safety Case Pattern
in order to argue about the safety property
Where there is a one-to-many relationships between
patterns, the following rules may be used in order to
detail the relationship:
or: define that the targets represent alternatives
where only one is required for completeness
and: define that all the target patterns are required
for completeness. This is implied in Figure 6 if
not otherwise specified
We assume here that the Trusted Backup design pat-
tern describes a configuration of an adaptable con-
troller, a conventional controller, a monitor and a
switch component. Both controllers operate in par-
allel and are granted control privileges according to
a switching scheme. A monitor supervises the adapt-
able controller in order to detect anomalies to its be-
haviour. The switch grants control to the adaptable
controller given that no anomalies are detected by the
monitor and the system under control is in a state for
which the adaptable controller may not cause harm,
otherwise the switch grant control to the conventional
controller.
The Trusted Backup design specifies the use of on
a redundant set of controllers and means for delega-
tion of control according to some type of diversifica-
tion of the operational state space. The requires rela-
tionships specify the requirement patterns which must
be instantiated and satisfied when instantiating the de-
sign pattern, here this is the Operational Domain Di-
versification and Redundancy requirement patterns.
The Trusted Backup design pattern may include
several other design patterns as part of its specifica-
tion. The include relationships of Figure 6 indicate
that the pattern include functionality for monitoring
and switching and that these are handled in dedicated
patterns named Monitor and Switch.
Depending on the intent for introducing adapt-
ability and other characteristics of the system design,
strategies for demonstrating safety may or may not be
applicable. If adaptivity is introduced in a design to
improve performance, we cannot make an argument
of improved safety. In Figure 6 there is illustrated
two applicable Safety Case Patterns named Accept-
able Risk and Constrained Adaptive Control where
it is sufficient to apply only one for demonstrating
safety.
REFERENCES
Alexander, C., Ishikawa, S., and Silverstein, M. (1977). A
Pattern Language: Towns, Buildings, Construction.
Oxford University Press.
Alexander, R., Kelly, T., and McDermid, J. (2008). Safety
cases for advanced control software: Safety case pat-
terns. Technical Report FA8655-07-1-3025, Depart-
ment of Computer Science, Univeristy of York.
Bishop, P., Bloomfield, R., and Guerra, S. (2004). The fu-
ture of goal-based assurance cases. In Proceedings of
Workshop on Assurance Cases. Supplemental Volume
of the 2004 International Conference on Dependable
Systems and Networks, pages 390–395.
Gamma, E., Helm, R., Johnson, R. E., and Vlissides,
J. (1995). Design Patterns: Elements of Reusable
Object-Oriented Software. Addison-Wesley.
Jackson, M. (2001). Problem Frames: Analysing and Struc-
turing Software Development Problems. Addison-
Wesley.
Qureshi, N. A. and Perini, A. (2009). Engineering adaptive
requirements. International Workshop on Software
Engineering for Adaptive and Self-Managing Systems,
pages 126–131.
Salehie, M. and Tahvildari, L. (2009). Self-adaptive soft-
ware: Landscape and research challenges. ACM
Trans. Auton. Adapt. Syst., 4(2):1–42.
Whittle, J., Sawyer, P., Bencomo, N., Cheng, B. H. C., and
michel Bruel, J. (2009). Relax: Incorporating uncer-
tainty into the specification of self-adaptive systems.
In 17th IEEE International Requirements Engineering
Conference RE 2009, pages 79–88.
ICINCO 2011 - 8th International Conference on Informatics in Control, Automation and Robotics
214