SAFECOMP 2002 Tutorials
[back to SAFECOMP 2002 Program at a Glance]


Tutorial 1 Tutorial 2 Tutorial 3
``Safety Case Management''  ``Methods for Dependability Analyses  of Software Intensive Systems''  ``Critical Systems Development with UML'' 
Tim Kelly (University of York, UK) Gerald Sonneck (ARCS, A) Jan Jürjens (Munich University of Technology, D)


Tutorial 1 (full day)

[back to SAFECOMP 2002 Program at a Glance]
``Safety Case Management''
Tim Kelly (University of York, UK)

Tutorial Abstract. Across a number of industries there has in recent years been a marked shift in the regulatory approach to ensuring system safety. Whereas previously compliance with prescriptive safety codes and standards may have been relied upon, the responsibility has now shifted back onto the developers and operators to construct and present well reasoned arguments that their systems achieve acceptable levels of safety. These arguments (together with supporting evidence) are typically presented as a ``safety case''. This tutorial will be of interest to anyone with responsibility for managing, constructing, reviewing or accepting safety cases.

The following topics will be covered:

Interactive group exercises will be used to help attendees gain a greater understanding of the issues surrounding safety case management and some experience of applying safety case construction techniques. The tutorial will highlight some of the specific requirements of the aerospace, nuclear, defence and transportation sectors.


Tutorial 2 (half day)

[back to SAFECOMP 2002 Program at a Glance]
``Methods for Dependability Analyses  of Software Intensive Systems''
Gerald Sonneck (ARCS, A)

Tutorial Abstract. The dependability analysis and evaluation of technical systems used in process control, manufacturing, transportation, space, medical devices and many other fields requires an integrated approach which considers the hardware (including computer hardware, but not restricted to that!), software and human components, as well as their interaction. Traditionally the dependability methods for each of these components have been developed all too often in almost complete isolation from the others. In practice, many serious accidents involve a combination of human, hardware and software errors which may not be covered by the conventional approach. These problems are compounded by a lack of awareness and communication between the disciplines studying human reliability, hardware and software dependability.

This tutorial is an introduction to the holistic dependability assessment of technical systems consisting of hardware, software and human components. It aims at providing the participants with an overview of state-of-the-art dependability methods. Therefore it concentrates mainly on methods which are already more or less acknowledged by the technical community and are consequently currently used for the dependability assessment of modern safety-relevant technical systems, such as Hazard Analysis, HAZOP (Hazard and Operability Analysis), FMECA (Failure Modes, Effects and Criticality Analysis), FTA (Fault Tree Analysis), ETA (Event Tree analysis), RCM (Reliability Centred Maintenance) or LCC (Life Cycle Costs).

The methods are explained is such detail as to allow the participants to understand their strengths and weaknesses and to avoid the most dangerous pitfalls. Their practical application is developed interactively with the participants in examples and a case study.


Tutorial 3 (half day)

[back to SAFECOMP 2002 Program at a Glance]
``Critical Systems Development with UML''
Jan Jürjens (Munich University of Technology, D)

Tutorial Abstract. The high quality development of Critical Systems (be it Dependable, Security-Critical, Real-Time, ...)  is difficult. Many critical systems are developed, fielded, and used that do not satisfy their criticality requirements, sometimes with spectacular failures. UML offers an unprecedented opportunity for high-quality Critical Systems Development that is feasible in an industrial context.

However, there are some challenges  one has to overcome to exploit this opportunity, which include the following: The tutorial aims to give background knowledge on using UML for Critical Systems Development and to contribute to overcoming these challenges.  It presents the current academic research and industrial best practice by addressing the following main subtopics: As an example application domain, we focus on security-critical systems.  We also show how to generalize the approach to the other application domains mentioned above.