CN103853871B - Safety requirement modeling method applicable for avionics system - Google Patents

Safety requirement modeling method applicable for avionics system Download PDF

Info

Publication number
CN103853871B
CN103853871B CN201310595322.0A CN201310595322A CN103853871B CN 103853871 B CN103853871 B CN 103853871B CN 201310595322 A CN201310595322 A CN 201310595322A CN 103853871 B CN103853871 B CN 103853871B
Authority
CN
China
Prior art keywords
use case
failure
security
safety
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310595322.0A
Other languages
Chinese (zh)
Other versions
CN103853871A (en
Inventor
吴际
张辉辉
李亚晖
牛文生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Xian Aeronautics Computing Technique Research Institute of AVIC
Original Assignee
Beihang University
Xian Aeronautics Computing Technique Research Institute of AVIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University, Xian Aeronautics Computing Technique Research Institute of AVIC filed Critical Beihang University
Priority to CN201310595322.0A priority Critical patent/CN103853871B/en
Publication of CN103853871A publication Critical patent/CN103853871A/en
Application granted granted Critical
Publication of CN103853871B publication Critical patent/CN103853871B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明公开了一种适用于航电系统的安全需求建模方法,该方法通过对航空嵌入式系统的安全性相关的概念和约束进行分析提取,并将提取的概念和约束与RUCM中的基本概念相结合,实现对UCMeta的扩展从而建立安全性相关的领域模型;通过对建立的领域模型进行分析,确定出航空嵌入式系统安全需求的描述模板使其在准确描述功能需求的同时又捕获安全性相关的非功能约束。本发明方法是一种半形式化的安全性需求描述方法,在RUCM的基础上增加安全性需求的描述模板和相应的限制规则,用于完整的、准确的对安全性需求进行描述,并支持一定程度的自动化验证。

The invention discloses a safety requirement modeling method suitable for avionics systems. The method analyzes and extracts the concepts and constraints related to the safety of aviation embedded systems, and combines the extracted concepts and constraints with the basic The concept is combined to realize the expansion of UCMeta to establish a security-related domain model; through the analysis of the established domain model, the description template for the security requirements of the aviation embedded system is determined so that it can accurately describe the functional requirements and capture the security requirements at the same time. Sex-related non-functional constraints. The method of the present invention is a semi-formal security requirement description method, which adds a security requirement description template and corresponding restriction rules on the basis of RUCM, and is used to describe the security requirement completely and accurately, and supports Some degree of automated validation.

Description

一种适用于航电系统的安全需求建模方法A Safety Requirement Modeling Method Applicable to Avionics System

技术领域technical field

本发明涉及一种需求建模的方法,更特别地说,是指一种适用于航电系统的安全需求建模方法。The invention relates to a method for modeling requirements, more particularly, a method for modeling safety requirements applicable to avionics systems.

背景技术Background technique

软件安全性(software safety)是关于软件所控制的系统始终处于不危及人的生命财产和生态环境的安全状态的一种性质。尤其是对于航空航天等需要高安全性的嵌入式实时软件而言,随着系统中软件所占比重的逐步增大,软件失效可能引起的后果也越来越严重。为保证系统的安全性,需要在需求分析阶段对系统的安全性进行描述和分析。Software safety is a property that the system controlled by the software is always in a safe state that does not endanger human life, property and the ecological environment. Especially for embedded real-time software that requires high security, such as aerospace, as the proportion of software in the system gradually increases, the possible consequences of software failure will become more and more serious. In order to ensure the security of the system, it is necessary to describe and analyze the security of the system in the requirement analysis stage.

需求建模是软件需求工程中的一项重要的活动,需求工程师通过采用不同的建模方法识别、理解、挖掘需求提供者对系统的期望,从而构建软件系统的结构模型,行为模型,或者其他各种对展示待开发软件的不同特性的模型。建模方法在这个活动中占了重要的作用,采用不同的建模方法意味着从不同的视角去看待软件问题,如何从对整体系统的期望中推导出对软件系统本身的期望,去展示软件系统如何行为并在软件加强型系统中如何起到它的作用。参见2008年7月第一版《软件需求工程:原理与方法》第50页,金芝等编著。Requirements modeling is an important activity in software requirements engineering. Requirements engineers use different modeling methods to identify, understand, and mine the expectations of requirements providers for the system, so as to build structural models, behavior models, or other Various pairs of models showing different characteristics of the software to be developed. Modeling methods play an important role in this activity. Adopting different modeling methods means looking at software issues from different perspectives, how to derive expectations for the software system itself from expectations for the overall system, and to demonstrate software How the system behaves and how it functions in a software-enhanced system. See page 50 of the first edition of "Software Requirements Engineering: Principles and Methods" in July 2008, edited by Jin Zhi et al.

在目前的需求建模方法中,主要使用的描述手段和技术是自然语言、图形符号语言和形式语言等。从实用性角度来划分有:结构化的需求建模方法和面向对象的需求建模方法。In the current demand modeling method, the main description methods and technologies used are natural language, graphic symbol language and formal language. From the perspective of practicality, there are: structured demand modeling method and object-oriented demand modeling method.

面向对象方法的技术路线包括有需求工程、软件设计和软件实现;其中,需求工程有需求获取和需求分析。面向对象方法首先从需求的源头(主要是用户)进行需求的获取,组织需求信息的用户描述,建立用例模型。在得到用户需求的完整、准确理解之后,面向对象方法就开始考虑软件的实现机制,进行软件设计。2009年4月第1版《需求工程-软件建模与分析》第315页,骆斌主编。The technical route of the object-oriented method includes requirements engineering, software design and software implementation; among them, requirements engineering includes requirements acquisition and requirements analysis. The object-oriented method first obtains requirements from the source of requirements (mainly users), organizes user descriptions of requirement information, and establishes use case models. After obtaining a complete and accurate understanding of user needs, the object-oriented method begins to consider the realization mechanism of the software and carry out software design. April 2009, the first edition of "Requirements Engineering - Software Modeling and Analysis", page 315, edited by Luo Bin.

综合模块化航空电子系统(Integrated Modular Architecture,IMA,简称航电系统)的软件包括操作系统、应用程序、数据库、网络、人机界面等应遵循统一的系列标准、规范研制开发,软件的可重用、标准化、智能化、可移植性、质量、可靠性等都应列入表征软件技术的特征参数之中。The software of the integrated modular avionics system (Integrated Modular Architecture, IMA, avionics system for short), including the operating system, application program, database, network, human-machine interface, etc., should follow a unified series of standards and specifications for research and development, and the software can be reused , standardization, intelligence, portability, quality, reliability, etc. should be included in the characteristic parameters of software technology.

发明内容Contents of the invention

为了使所需构建的航电系统软件具有较高的安全性需求,本发明提供一种适用于航电系统的安全需求建模方法。本发明的建模方法应用RUCM中的用例元模型UCMeta对参与者Actor和用例Use Case进行安全扩展,实现所需构建的航电系统软件的需求建模的描述;引述DO-178B标准与现有航电系统软件进行安全缺陷识别;通过本发明设计的安全需求模型能够为航电系统的软件设计提供完整无二义的需求描述。In order to make the avionics system software to be constructed have higher safety requirements, the present invention provides a safety requirement modeling method suitable for avionics systems. The modeling method of the present invention uses the use case meta-model UCMeta in RUCM to safely expand the participant Actor and the use case Use Case, and realize the description of the demand modeling of the avionics system software to be built; The software of the avionics system performs safety defect identification; the safety requirement model designed by the invention can provide a complete and unambiguous requirement description for the software design of the avionics system.

本发明的一种适用于航电系统的安全需求建模方法,具体地有下列步骤:A safety requirement modeling method applicable to avionics systems of the present invention specifically has the following steps:

步骤一:建立安全需求的领域概念模型;Step 1: Establish a domain conceptual model of security requirements;

依据RTCA/DO-178B标准对现有航电系统软件进行安全识别创建得到领域概念模型;According to the RTCA/DO-178B standard, the security identification of the existing avionics system software is established to obtain the domain concept model;

步骤二:构建基于UCMeta元模型的航电系统的图形扩展;该航电系统的图形扩展是依据步骤一得到的安全需求的领域概念模型对UCMeta元模型进行扩展而得到;Step 2: Construct the graphic extension of the avionics system based on the UCMeta meta-model; the graphic extension of the avionics system is obtained by extending the UCMeta meta-model based on the domain concept model of security requirements obtained in step 1;

步骤三:构建基于RUCM描述模板的航电系统安全需求模板;该航电系统安全需求模板是在RUCM描述模板上进行添加相关项得到。Step 3: Build an avionics system security requirement template based on the RUCM description template; the avionics system security requirement template is obtained by adding related items to the RUCM description template.

在本发明中步骤二中,将领域概念模型转换为UML Profile,对RUCM的元模型UCMeta中进行安全扩展;在Actor中进行细化,对Use Case进行安全性扩展建立Safety UseCase;分析领域概念模型,确定出安全需求的描述模板以及限制规则和关键字的使用;扩展RUCM描述模板进行安全需求描述,添加10条安全描述规则和若干关键字以保证RUCM的描述完整、准确、无二义性;扩展后的UCMeta创建支持安全需求描述的Use Case Diagram,同时用户通过每一个Use Case都进行了完整准确的功能描述和安全需求描述。In step 2 of the present invention, the domain conceptual model is converted into UML Profile, and the metamodel UCMeta of RUCM is safely extended; refinement is carried out in the Actor, and the Safety UseCase is established for Use Case; the domain conceptual model is analyzed , determine the description template of security requirements and the use of restriction rules and keywords; expand the RUCM description template to describe security requirements, add 10 security description rules and several keywords to ensure that the description of RUCM is complete, accurate, and unambiguous; The expanded UCMeta creates a Use Case Diagram that supports the description of security requirements. At the same time, the user has completed a complete and accurate description of the function and security requirements through each Use Case.

本发明安全需求建模方法的优点在于:The advantages of the safety requirement modeling method of the present invention are:

①本发明针对高安全性的航空嵌入式系统,对安全标准DO-178B进行了深入学习并创建了相应的安全模型,从而可以在软件需求阶段对安全需求进行建模。①Aiming at high-security aviation embedded systems, the present invention has carried out in-depth study on the safety standard DO-178B and created a corresponding safety model, so that the safety requirements can be modeled in the software requirements stage.

②本发明针对航空嵌入式系统的安全需求建模,扩展了标准RUCM的UCMeta。UCMeta是RUCM方法的元模型,它是使用MOF(Meta Object Facility)定义的。通过领域分析对UML标准Use Case Diagram中的模型元素Actor和Use Case进行细化和安全扩展从而可以支持进行图形化的安全需求建模。② The present invention aims at modeling the security requirements of aviation embedded systems, and expands the UCMeta of the standard RUCM. UCMeta is the metamodel of the RUCM method, which is defined using MOF (Meta Object Facility). Through domain analysis, the model elements Actor and Use Case in the UML standard Use Case Diagram are refined and safely extended to support graphical security requirement modeling.

③本发明针对航空嵌入式系统的安全需求建模,扩展了标准RUCM的需求描述模板及其限制规则。通过扩展RUCM的需求描述模板可以支持在软件需求建模阶段对安全相关的故障处理进行描述,并通过限制规则的扩展使得安全需求的描述完整、准确、无二义性。③ The present invention aims at modeling the safety requirements of the aviation embedded system, and expands the requirement description template and its restriction rules of the standard RUCM. By extending the requirements description template of RUCM, it can support the description of safety-related fault handling in the software requirements modeling stage, and the description of safety requirements is complete, accurate and unambiguous through the expansion of restriction rules.

附图说明Description of drawings

图1是常规面向对象方法的技术路线图。Figure 1 is a technical roadmap of a conventional object-oriented approach.

图2为本发明适用范围内的领域概念模型图。FIG. 2 is a conceptual model diagram of the field within the scope of application of the present invention.

图3为本发明所述的RUCM的UCMeta包图。Fig. 3 is a UCMeta package diagram of RUCM according to the present invention.

图4为本发明所述的UCSTemplate包图。Fig. 4 is a package diagram of UCSTemplate according to the present invention.

图5为本发明所述的Actor细化模型图。Fig. 5 is a detailed model diagram of Actor according to the present invention.

图6为本发明所述的Use Case扩展模型图。Fig. 6 is a diagram of the extended model of Use Case according to the present invention.

图7为本发明所述的Use Case与Actor或资源之间的数据交换图。Fig. 7 is a data exchange diagram between Use Case and Actor or resource according to the present invention.

图8为本发明所述的失效模型图。Fig. 8 is a failure model diagram of the present invention.

图9为本发明所述的失效处理分析模型图。Fig. 9 is a diagram of a failure treatment analysis model according to the present invention.

图10为本发明所述的失效处理语句模型图。Fig. 10 is a model diagram of a failure handling statement according to the present invention.

图11为Use case template需求的各栏信息示意图。Figure 11 is a schematic diagram of information in each column required by the Use case template.

具体实施方式detailed description

下面将结合附图和实施例对本发明做进一步的详细说明。The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

参见图1所示,图1中的“用例模型”就是本发明申请中需要建模得到的安全需求模型。Referring to Fig. 1, the "use case model" in Fig. 1 is the security requirement model that needs to be modeled in the application of the present invention.

本发明的一种适用于航电系统的安全需求建模方法,具体包括有下列步骤:A safety requirement modeling method applicable to avionics systems of the present invention specifically includes the following steps:

步骤一:建立安全需求的领域概念模型Step 1: Establish a Domain Conceptual Model of Security Requirements

依据RTCA/DO-178B标准对现有航电系统软件进行安全识别创建得到领域概念模型。Based on the RTCA/DO-178B standard, the security identification of the existing avionics system software is established to obtain the domain concept model.

RTCA/DO-178B标准的全称是Royal Technical Commision on Aviation DO-178B。The full name of the RTCA/DO-178B standard is Royal Technical Commision on Aviation DO-178B.

安全需求是由安全级别的要求和安全功能的要求两个部分组成的。安全级别的要求主要为安全隔离措施,即不同安全等级的软件需要给予不同程度的关注;安全功能的要求主要包括对系统中引发危害状态的失效进行识别,降低其进入不安全状态的概率和削弱其危害后果。Security requirements are composed of two parts: security level requirements and security function requirements. The requirements for security levels are mainly security isolation measures, that is, software with different security levels need to be given different degrees of attention; the requirements for security functions mainly include identifying failures that cause harmful states in the system, reducing the probability of entering an unsafe state and weakening its harmful consequences.

危害(Hazard)指由功能失效或外部事件等造成的系统潜在的不安全状态,DO-178B标准中对危害的级别进行了划分,表明其对系统的影响,这些类别分别是:灾难性的、危险的/严重的、较重的、较轻的、无影响的;相应的对安全关键软件定义其安全级别,根据其引发的危害的严重程度进行划分,同样分为5个级别。Hazard refers to the potential unsafe state of the system caused by functional failure or external events. The DO-178B standard divides the hazard levels to indicate their impact on the system. These categories are: catastrophic, Dangerous/serious, heavy, light, and no impact; correspondingly define the safety level for safety-critical software, and divide it into 5 levels according to the severity of the harm it causes.

表1:软件安全级别Table 1: Software Security Levels

安全功能需求即对系统中可能引发的危害进行识别,并采取一定的措施降低其发生概率或减轻其影响的要求。从下面几个角度对安全功能进行划分:Safety function requirements are the requirements to identify possible hazards in the system and take certain measures to reduce the probability of occurrence or mitigate their impact. Security functions are divided from the following perspectives:

1)失效模式和失效影响分析1) Failure mode and failure effect analysis

失效模式指失效发生的方式。通过对GB7826标准和GJBZ1391标准的学习,本发明中将失效模式分为五类:输入数据失效、输出数据失效、无法完成预期的功能失效、超时失效和异常的硬件、用户或环境造成的失效。Failure mode refers to the manner in which failure occurs. Through the study of GB7826 standard and GJBZ1391 standard, the failure mode is divided into five categories in the present invention: input data failure, output data failure, expected function failure, timeout failure and failure caused by abnormal hardware, user or environment.

用失效影响来表示用例(Use Case)的失效对该用例所在的系统或子系统造成的影响,而当该影响会对系统产生一定的危害(对安全性造成影响)时,该用例为安全关键的。The failure impact is used to represent the impact of the failure of the use case (Use Case) on the system or subsystem where the use case is located, and when the impact will cause certain harm to the system (impact on safety), the use case is safety-critical of.

表2:失效的定义Table 2: Definition of failure

英文English 中文意义Chinese meaning FailureIDFailureID 失效的唯一标识invalid unique identifier FailureDescriptionFailureDescription 失效的描述Description of failure Failure ModeFailure Mode 失效模式failure mode Failure CauseFailure Cause 失效原因Reason for failure LevelLevel 失效的安全级别Failed security level HazardHazard 失效引起的危害 Hazard due to failure

对于每个危害(Hazard),定义其严重程度和发生的概率,严重程度和发生概率均为定性分析。在系统需求分析阶段可能无法确定或者很难确定一个危害的发生概率,可以先用None表示,数据完整时再对其进行补充。危害的风险为其发生概率和严重程度的组合,根据风险分析可对危害进行分类。失效的严重程度是根据其可能导致的风险程度最高的危害决定的。For each hazard (Hazard), define its severity and probability of occurrence, both of which are qualitative analysis. In the system requirements analysis stage, it may be impossible or difficult to determine the occurrence probability of a hazard. It can be represented by None first, and it will be supplemented when the data is complete. The risk of a hazard is its combination of probability of occurrence and severity, and hazards can be classified according to risk analysis. The severity of a failure is determined according to the hazard that it is likely to cause with the highest degree of risk.

表3:危害的定义Table 3: Definition of Hazards

英文English 中文意义Chinese meaning SeveritySeverity 危害的严重程度severity of harm ProbabilityProbability 危害的发生概率Probability of Hazard Occurrence FailureFailure 引发该危害的失效 failure to cause the hazard

危害可以分为两种:Single Failure Hazard和Combine Failure Hazard,即单个失效引起的危害和多个失效引起的危害。例如,飞机中可能有多套刹车系统,则单个刹车系统的失效不会对飞机造成危害,只有所有的刹车系统全部失效才会导致 无法减速,对飞机造成危害,这种情况为多个失效引起的危害。而对于进程级健康监控,如其无法对故障进行处理则可能直接造成系统危害,为单个失效引起的危害。Hazards can be divided into two types: Single Failure Hazard and Combine Failure Hazard, that is, hazards caused by a single failure and hazards caused by multiple failures. For example, there may be multiple sets of brake systems in an aircraft, and the failure of a single brake system will not cause harm to the aircraft. Only when all the brake systems fail will cause the inability to decelerate and cause harm to the aircraft. This situation is caused by multiple failures. hazards. For process-level health monitoring, if it cannot handle faults, it may directly cause system damage, which is the damage caused by a single failure.

2)失效原因分析2) Failure cause analysis

通过故障分析来描述失效的原因,每个故障都有自己的触发条件,用Tigger来表示故障的触发。在一条或多条语句的执行过程成,对守护条件进行检查,如果条件不满足,则触发一个故障,进而导致用例失效。The cause of the failure is described through failure analysis. Each failure has its own trigger condition, and Tigger is used to represent the trigger of the failure. During the execution of one or more statements, the guard condition is checked, and if the condition is not met, a fault is triggered and the use case is invalidated.

对守护条件的描述是由安全约束(Safety Constraint)表示的。安全约束共分为三类:实时性约束、数据约束和状态约束。实时性约束为周期性或者执行时间的约束;数据约束主要为对数据值的约束,而状态约束则为对用例语句执行状态的约束,状态共分为三类:正常、异常终止、死循环。The description of the guard condition is expressed by the safety constraint (Safety Constraint). Security constraints are divided into three categories: real-time constraints, data constraints and state constraints. Real-time constraints are periodic or execution time constraints; data constraints are mainly constraints on data values, and state constraints are constraints on the execution status of use case statements. The status is divided into three categories: normal, abnormal termination, and infinite loop.

表4:安全约束的定义Table 4: Definition of Security Constraints

英文English 中文意义Chinese meaning ConstraintIDConstraintID 约束的标识ID of the constraint SentenceSentence 字段中定义约束的有效范围The effective range of constraints defined in the field ConstraintConstraint 字段为约束的内容 The field is the content of the constraint

在领域概念模型如图2所示中,本发明通过遵循DO-178B/C标准定义了12中安全属性,它们的具体的含义如下:In the domain concept model shown in Figure 2, the present invention defines 12 security attributes by following the DO-178B/C standard, and their specific meanings are as follows:

P1:每个安全构件都要提供相应的安全接口以检测并处理构件内部产生的故障和从外部传递过来的故障。P1: Each security component must provide a corresponding security interface to detect and handle faults generated inside the component and transmitted from the outside.

P2:与安全性相关的接口只能被安全构件或故障注册构件被激活。P2: Security-related interfaces can only be activated by security components or fault registration components.

P3:每个安全构件和它的安全接口必须要有相同的安全性级别。P3: Each security component and its security interface must have the same security level.

P4:每个提供共享数据访问的安全构件都使用不变式来确保对数据的修改满足相应的约束。P4: Every security construct that provides access to shared data uses invariants to ensure that modifications to the data satisfy corresponding constraints.

P5:每个平台构件应该能够为相应的部署构件提供足够的资源。P5: Each platform component should be able to provide sufficient resources for the corresponding deployment component.

P6:每个被识别的故障必须要至少被一个构件检测并处理。P6: Each identified fault must be detected and handled by at least one component.

P7:每个被识别的故障必须要有相应的激励和处理策略。P7: Each identified failure must have corresponding incentives and handling strategies.

P8:每个能够传播的故障必须要能够被其他的安全构件处理。P8: Every fault that can propagate must be able to be handled by other security components.

P9:故障只能被安全通道注册到故障注册构件中。P9: Faults can only be registered in the fault registration component by the secure channel.

P10:注册的故障只能被注册构件依据相应的处理策略进行处理。P10: Registered faults can only be processed by registered components according to corresponding processing strategies.

P11:每个安全通道都要提供接口以保护安全构件之间交互的安全性。P11: Each secure channel must provide an interface to protect the security of interactions between secure components.

P12:每个安全通道的安全级别不能比跟它连接的那些构件的安全级别低。P12: The security level of each security channel cannot be lower than the security level of those components connected to it.

步骤二:构建基于UCMeta元模型的航电系统的图形扩展Step 2: Construct the graphics extension of the avionics system based on the UCMeta meta-model

参见图2所示,在本发明中,依据步骤一得到的安全需求的领域概念模型对UCMeta元模型进行扩展,从而得到航电系统的图形扩展。Referring to Fig. 2, in the present invention, the UCMeta meta-model is extended according to the domain concept model of safety requirements obtained in step 1, so as to obtain the graphic extension of the avionics system.

UCMeta是RUCM方法的元模型,它是使用MOF(Meta Object Facility)定义的,包括有UCMeta、UML::UseCases、UCSTemplate、SentenceSemantics、SentencePatterns、SentenceStructure。其中后三者主要完成了对自然语言的规范限定。UCMeta的结构如图3所示。UCMeta is the metamodel of the RUCM method, which is defined using MOF (Meta Object Facility), including UCMeta, UML::UseCases, UCSTemplate, SentenceSemantics, SentencePatterns, and SentenceStructure. Among them, the latter three mainly complete the specification and limitation of natural language. The structure of UCMeta is shown in Figure 3.

对UCMeta的安全扩展重点关注UCSTemplate包,元类UseCase可通过添加到UseCaseSpecification的关系进行扩展。参见图4所示,UseCaseSpecification包含一个BriefDescription、Preconditon、一个或多个FlowOfEvents、一个primary actor、0到多个secondary actors。BriefDescription、Preconditon、PostConditon和FlowOfEvents均含有一系列的Sentences。有两种事件流:BasicFlow和AlternativeFlow。每个用例必须含有一个BasicFlow,可以有0到多个AlternativeFlow。每个事件流有一个PostCondition,由一系列的Sentences组成。有三种不同方式的分支流:GlobalAlternative,SpecificAlternative,和BoundedAlternative。每一个AlternativeFlow都有一个condition,对应一个引用流。Security extensions to UCMeta focus on the UCSTemplate package, and the metaclass UseCase can be extended by adding relationships to UseCaseSpecification. As shown in Figure 4, UseCaseSpecification includes a BriefDescription, Precondition, one or more FlowOfEvents, a primary actor, and 0 to more secondary actors. BriefDescription, Precondition, PostConditon and FlowOfEvents all contain a series of Sentences. There are two kinds of event flows: BasicFlow and AlternativeFlow. Each use case must contain a BasicFlow, and there can be 0 or more AlternativeFlows. Each event stream has a PostCondition consisting of a series of Sentences. There are three different ways of branching streams: GlobalAlternative, SpecificAlternative, and BoundedAlternative. Each AlternativeFlow has a condition corresponding to a reference flow.

UCSTemplate中的语句分为三种:简单语句(元类SimpleSentence),复杂语句(子包ComplexSentence),特殊语句(子包SpecialSentence)。简单语句为含有一个独立分句没有从属子句:只有一个主语和一个谓语。UCMeta有四种复杂语句,对于四种关键词:条件(IF-THEN-ELSEELSEIF-THEN-ENDIF)、循环(DO-UNTIL)、并发(MEANWHILE)和验证(VALIDATES THAT)。有四种特定语句说明一个用例中的事件流是怎样与另外的事件流交互的,这四种分别对应四个关键字:RESUME STEP、ABORT、INCLUDE USE CASE和EXTENDED BY。There are three types of statements in UCSTemplate: simple statements (metaclass SimpleSentence), complex statements (subpackage ComplexSentence), and special statements (subpackage SpecialSentence). A simple statement is one that contains an independent clause and no dependent clauses: only one subject and one predicate. UCMeta has four complex statements, for four keywords: condition (IF-THEN-ELSEELSEIF-THEN-ENDIF), loop (DO-UNTIL), concurrent (MEANWHILE) and validation (VALIDATES THAT). There are four specific statements that illustrate how the flow of events in a use case interacts with another flow of events, and these four correspond to four keywords: RESUME STEP, ABORT, INCLUDE USE CASE, and EXTENDED BY.

下面分别从活动者(Actor)、用例(Use Case)介绍本发明的详细扩展:The following introduces the detailed expansion of the present invention from the actors (Actor) and use cases (Use Case):

(A)活动者Actor的细化(A) Refinement of Actors

UML中使用活动者来描述系统外部与系统发生交互的角色,通常可以是使用系统的人员,也可以是外部设备或逻辑上的实体。UML标准并未对活动者进行分类。在RUCM中针对每个用例,将活动者分为主要活动者(Primary Actor)和次要活动者(SecondaryActor)。主要活动者是初始化该用例的第一个活动者,其余则是次要活动者。Actors are used in UML to describe the roles outside the system that interact with the system, which can usually be people who use the system, or external devices or logical entities. The UML standard does not classify actors. For each use case in RUCM, actors are divided into primary actors (Primary Actor) and secondary actors (SecondaryActor). The primary actor is the first actor to initialize the use case, the rest are secondary actors.

本发明中将UML活动者的概念分类为四种类型,如图5所示,具体的内容如下:In the present invention, the concept of UML activists is classified into four types, as shown in Figure 5, and the specific contents are as follows:

(1)Timer,周期性产生特定事件的实体,拥有一个类型为NFP_Duration类型的duration(时长)属性。NFP_Duration是从UML/MARTE中导入的数据类型,包含一个实数和一个时间单位信息。(1) Timer, an entity that periodically generates specific events, has a duration (duration) attribute of type NFP_Duration. NFP_Duration is a data type imported from UML/MARTE, which contains a real number and a time unit information.

(2)HumanActor,表示该活动者是实际人员。(2) HumanActor, indicating that the actor is an actual person.

(3)ExternalInstrument,表示外部器件,其direction属性描述了该器件的数据输入输出方向,其signal属性描述了该器件的信号类型是数字信号或模拟信号。Sensor(传感器)和Actuator(作动器)是航电系统领域的常用概念,在此作为ExternalInstrument的子类出现。(3) ExternalInstrument, which represents an external device, its direction attribute describes the data input and output direction of the device, and its signal attribute describes whether the signal type of the device is a digital signal or an analog signal. Sensor (sensor) and Actuator (actuator) are common concepts in the field of avionics systems, and they appear here as subclasses of ExternalInstrument.

(4)ExternalSystem,用来描述外部系统。(4) ExternalSystem, used to describe the external system.

(B)Use Case的安全扩展(B) Security extension of Use Case

Use Case描述了系统所执行的一组动作,通过与活动者的交互描述系统行为,是重要的概念。RUCM方法中对Use Case的规格说明进行了规范。本发明中将Uase Case扩展为Safety Use Case,定义为实现一定安全功能的用例,而安全功能则表示对系统或其组成部分的失效进行识别和处理的功能,因此,每一个Safety Use Case须关联到一个或多个失效的识别和处理。下面具体的介绍相关的扩展内容:Use Case describes a set of actions performed by the system, and describes system behavior through interaction with actors, which is an important concept. The specification of Use Case is regulated in the RUCM method. In the present invention, Use Case is extended to Safety Use Case, which is defined as a use case that realizes a certain safety function, and safety function refers to the function of identifying and processing the failure of the system or its components. Therefore, each Safety Use Case must be associated with to the identification and handling of one or more failures. The following specifically introduces the relevant extension content:

(1)Use Case的细化。本发明中Safety Use Case继承自Use Case,其模型如图5所示。将Safety Use Case定义为实现一定安全功能的用例,每一个Safety Use Case都有自己的安全级别它能够识别出相应的失效故障,每一个Safety Use Case须关联到一个或多个失效的识别和处理。(1) Refinement of Use Case. In the present invention, the Safety Use Case is inherited from the Use Case, and its model is shown in FIG. 5 . Define Safety Use Case as a use case that realizes a certain safety function. Each Safety Use Case has its own safety level and can identify corresponding failures. Each Safety Use Case must be associated with one or more failure identification and processing .

DO-178B标准中对安全级别进行定义和划分。Safety Use Case的安全性级别是根据其可能发生的失效的严重程度来确定的。安全级别分为五个等级,分别为level-A到level-E,分别对应灾难性的、危险的/严重的、较重的、较轻的、无影响的。对于不同级别Safety Use Case应给与不同程度的关注。Security levels are defined and classified in the DO-178B standard. The safety level of Safety Use Case is determined according to the severity of its possible failure. The safety level is divided into five levels, namely level-A to level-E, which correspond to catastrophic, dangerous/serious, heavy, light and no impact respectively. Different levels of Safety Use Case should be given different degrees of attention.

(2)软件安全级别的需求建模。对软件安全级别相关的需求和约束,即安全隔离措施进行定义。安全隔离措施指将安全关键系统和非安全性关键系统进行隔离,安全级别较高的系统和安全级别较低的系统进行隔离,以确保非安全性关键系统或安全级别较低的系统以预期外的方式影响到安全关键模块的功能。(2) Requirements modeling of software security level. Define the requirements and constraints related to the software security level, that is, security isolation measures. Safety isolation measures refer to the isolation of safety-critical systems from non-safety-critical systems, and isolation of systems with higher safety levels from systems with lower safety levels, so as to ensure that non-safety-critical systems or systems with lower safety levels are not as expected. in a manner that affects the functionality of safety-critical modules.

本发明中对软件安全级别相关的需求和约束,即安全隔离措施进行了定义,具体表现可以分为两个方面:In the present invention, the requirements and constraints related to the software security level, that is, the security isolation measures are defined, and the specific performance can be divided into two aspects:

a)当外部系统或外部设备类型的Actor和Safety Use Case进行数据交换时,外部系统或外部设备的安全级别应不低于Safety Use Case的安全级别。若为外部系统,则应确保外部系统的安全性;若为外部设备,则应选用较可靠的外部设备。a) When the Actor of the external system or external device type exchanges data with the Safety Use Case, the security level of the external system or external device should not be lower than that of the Safety Use Case. If it is an external system, the security of the external system should be ensured; if it is an external device, a more reliable external device should be selected.

b)当Safety Use Case使用系统中某一资源时,该资源的安全级别应不低于Safety Use Case的安全级别。b) When the Safety Use Case uses a certain resource in the system, the security level of the resource should not be lower than that of the Safety Use Case.

在本发明中用Communication Sentence来表示用例与执行者或者用例与资源之间的数据交换,如图6所示,Communication Media则是通讯介质,为数据的传输提供支持。模型中列举出了几种常见的通讯介质:system_call(系统调用)、hw_port(硬件端口)、bus_protocol(总线)、lan_protocol(局域网)和sys_service(系统提供的服务,如黑板、信号量以及缓冲区等)。In the present invention, Communication Sentence is used to represent data exchange between use cases and executors or use cases and resources, as shown in FIG. 6 , and Communication Media is a communication medium to provide support for data transmission. Several common communication media are listed in the model: system_call (system call), hw_port (hardware port), bus_protocol (bus), lan_protocol (local area network) and sys_service (services provided by the system, such as blackboard, semaphore and buffer, etc. ).

同样Resource也定义了相应的安全级别属性,用例可以通过一定的介质与资源、外部设备或者外部系统进行数据交换。用关键字COLLECT INPUT FROM和关键字DELIEVROUTPUT TO表示从外部设备、外部系统或其他用例收集或发送数据,用关键字VIA表示数据的传输方式。Similarly, Resource also defines the corresponding security level attributes, and use cases can exchange data with resources, external devices or external systems through certain media. Use the keyword COLLECT INPUT FROM and the keyword DELIEVROUTPUT TO to indicate collecting or sending data from external devices, external systems or other use cases, and use the keyword VIA to indicate the data transmission method.

(3)软件安全功能的需求建模。安全功能需求为对系统中可能引发的危害进行识别,并采取一定的措施降低其发生概率或减轻其影响的要求。下面从三方面进行详细的介绍:(3) Requirements modeling of software security functions. Safety function requirements are requirements for identifying possible hazards in the system and taking certain measures to reduce the probability of occurrence or mitigate their impact. The following is a detailed introduction from three aspects:

a)失效模式和失效影响分析,模型如图7所示,本发明中用失效影响来表示用例的失效对该用例所在的系统或子系统造成的影响,而当该影响会对系统产生一定的危害(对安全性造成影响)时,该用例为安全关键的。所以,对于Safety Use Case,其失效一定会导致一个或多个危害Hazard。对于每个Hazard,定义其严重程度和发生的概率,严重程度和发生概率均为定性分析。危害的风险为其发生概率和严重程度的组合,根据风险分析可对危害进行分类。失效的严重程度是根据其可能导致的风险程度最高的危害决定的,而SafetyUse Case的安全级别则是由其安全级别最高的失效决定的。a) Failure mode and failure impact analysis, the model is shown in Figure 7. In the present invention, the failure impact is used to represent the impact of the failure of the use case on the system or subsystem where the use case is located, and when the impact will have a certain impact on the system A use case is safety-critical when it is compromised (impact on safety). Therefore, for Safety Use Case, its failure will definitely lead to one or more hazards. For each Hazard, define its severity and probability of occurrence, both of which are qualitative analysis. The risk of a hazard is its combination of probability of occurrence and severity, and hazards can be classified according to risk analysis. The severity of failure is determined according to the hazard with the highest risk that it may cause, while the safety level of SafetyUse Case is determined by the failure with the highest safety level.

b)失效原因分析,模型如图8所示,本发明通过故障分析来描述失效的原因,模型中列出了几种常见的故障类型。用Tigger来表示故障的触发,在一条或多条语句的执行过程成,对守护条件进行检查,如果条件不满足,则触发一个故障,进而导致用例失效。对守护条件的描述是由Safety Constraint(安全约束)表示的。安全约束共分为三类:实时性约束、数据约束和状态约束。实时性约束为周期性或者执行时间的约束;数据约束主要为对数据值的约束,而状态约束则为对用例语句执行状态的约束,状态共分为三类:正常、异常终止、死循环。用Safety Condition Sentence来描述条件检查语句。一个条件检查语句是对一条约束的检查。用关键字CHECK CONSTRAINT表示条件检查。如有约束语句c1,其作用范围为STEP1,约束为STATE=normal,则相应的条件检查语句示例如下:The system CHECKCONSTRAINT c1。b) Failure cause analysis, the model is shown in Figure 8, the present invention describes the cause of failure through failure analysis, and several common failure types are listed in the model. Use Tigger to represent the triggering of faults. During the execution of one or more statements, the guard conditions are checked. If the conditions are not met, a fault is triggered, which in turn leads to the failure of the use case. The description of guard conditions is expressed by Safety Constraint (safety constraints). Security constraints are divided into three categories: real-time constraints, data constraints and state constraints. Real-time constraints are periodic or execution time constraints; data constraints are mainly constraints on data values, and state constraints are constraints on the execution status of use case statements. The status is divided into three categories: normal, abnormal termination, and infinite loop. Use Safety Condition Sentence to describe the condition check statement. A condition check statement is a check of a constraint. Use the keyword CHECK CONSTRAINT to express conditional checks. If there is a constraint statement c1, its scope is STEP1, and the constraint is STATE=normal, the corresponding condition check statement example is as follows: The system CHECKCONSTRAINT c1.

c)失效处理,图9中对失效的控制方式进行建模。采用一定的缓解措施对失效进行控制,Failure Mitigation定义为分支流的一种,可定义一系列的处理流程对失效进行处理。另外,对几种常用的失效处理方式进行建模。Record表示对失效进行记录;Retry表示重试失效部分功能,其属性retry_times定义重试的次数;Progogate表示在本用例中不对失效进行处理,而是将其交给其他用例或者系统进行处理。同时可以根据失效的类型和原因,对每个失效定义一系列的处理流程。用几种特殊的语句表示失效的特殊处理方式,如所图10所示。其中,Record Sentence的使用形式为RECORD THE FAILURE;Retry Sentence的使用形式为RETRY FOR…TIMES;Propogate Sentence的使用形式为PROPOGATE TO USECASE…。c) Failure handling, the failure control method is modeled in Figure 9. Use certain mitigation measures to control the failure. Failure Mitigation is defined as a branch flow, and a series of processing procedures can be defined to handle the failure. In addition, several commonly used failure handling methods are modeled. Record means to record the failure; Retry means to retry the failed part of the function, and its attribute retry_times defines the number of retries; Progogate means that the failure is not processed in this use case, but is handed over to other use cases or systems for processing. At the same time, a series of processing procedures can be defined for each failure according to the type and cause of failure. Use several special sentences to indicate the special handling of failure, as shown in Figure 10. Among them, the use form of Record Sentence is RECORD THE FAILURE; the use form of Retry Sentence is RETRY FOR...TIMES; the use form of Propogate Sentence is PROPOGATE TO USECASE....

步骤三:构建基于RUCM描述模板的航电系统安全需求模板Step 3: Build an avionics system security requirement template based on the RUCM description template

参见图11所示,RUCM描述模板的内容包括:用例名字(Use Case Nmae),用例简述(Brief Description),用例执行的前置条件(Precondition),用例的主要活动者(PrimaryActor),用例的其他活动者(Secondary Actors),该用例与其他用例的依赖关系(Dependency),该用例与其他用例之间的泛化关系(Generalization),该用例的基本事件流(Basic Flow)以及其他的三个事件流(Global Alternative Flow,BoundedAlternative Flow,Specific Alternative Flow)。其中每个事件流执行结束后都必须要有一个Post Condition表示该事件流执行后的结果,其中每一个用例中有且仅有一个Basic Flow,而Global Alternative Flow、Bounded Alternative Flow、SpecificAlternative Flow根据具体的实际情形确定其存在的个数。RUCM描述模板在使用时还配有相应的规则和关键字。As shown in Figure 11, the content of the RUCM description template includes: use case name (Use Case Nmae), use case brief description (Brief Description), use case execution precondition (Precondition), use case main actor (PrimaryActor), use case Other actors (Secondary Actors), the dependencies between this use case and other use cases (Dependency), the generalization relationship between this use case and other use cases (Generalization), the basic event flow of this use case (Basic Flow) and the other three Event flow (Global Alternative Flow, Bounded Alternative Flow, Specific Alternative Flow). After the execution of each event flow, there must be a Post Condition indicating the result of the event flow after execution. There is one and only one Basic Flow in each use case, and the Global Alternative Flow, Bounded Alternative Flow, and Specific Alternative Flow are based on specific The actual situation determines the number of its existence. The RUCM description template is also equipped with corresponding rules and keywords when used.

本发明中不仅对RUCM需求描述模板进行了安全需求描述的相关扩展,同时还增加了相应的新规则和关键字。下面分别从这两个方面进行详细的扩展:In the present invention, not only the relevant expansion of the security requirement description is carried out to the RUCM requirement description template, but also corresponding new rules and keywords are added. The following is a detailed expansion of these two aspects:

(1)安全需求描述模板(1) Security requirements description template

标准的RUCM描述模板只定义了三种事件流,分别是基本事件流、全局扩展事件流和局部扩展事件流,为了进行安全需求的描述就必须要对事件流进行扩展以描述故障及其相应的处理方式。扩展事件流就是针对一个基本事件流或扩展事件流中某个或某些活动事件发生时的其他处理情况。The standard RUCM description template only defines three kinds of event flows, which are the basic event flow, the global extended event flow and the local extended event flow. In order to describe the security requirements, the event flow must be extended to describe the fault and its corresponding processing method. The extended event stream is aimed at other processing situations when one or some active events in a basic event stream or extended event stream occur.

本发明中扩展后的安全需求描述模板如下:The expanded security requirement description template in the present invention is as follows:

表5:安全需求描述模板Table 5: Security Requirements Description Template

表6:系统危害表Table 6: System hazard table

HazardHazard SeveritySeverity ProbabilityProbability FailureFailure

安全需求模板的基本部分和普通的RUCM用例模板基本保持一致,只添加一行SafetyLevel,对其安全级别进行描述。The basic part of the safety requirement template is basically consistent with the common RUCM use case template, and only one line of SafetyLevel is added to describe its safety level.

在此基础上又添加安全性相关的概念描述,具体的扩展如下:On this basis, a security-related conceptual description is added, and the specific extensions are as follows:

a)添加失效的描述a) Add a description of the failure

表7:失效描述Table 7: Failure Description

b)添加失效的降级处理描述b) Add a description of the degraded processing of failure

表8:失效的降级处理Table 8: Failure downgrade processing

Failure Mitigation:失效降级措施,为分支流,可定义一系列的处理流程对失效进行处理,也可以添加预定义的处理方式,每个Failure Mitigation都要有一个PostCondition以表示本次处理的结果。Failure Mitigation: Failure downgrading measures, which are branch streams, can define a series of processing procedures to handle failures, and can also add predefined processing methods. Each Failure Mitigation must have a PostCondition to indicate the result of this processing.

c)添加约束定义c) Add constraint definition

表9:约束定义Table 9: Constraint Definitions

ConstraintIDConstraintID SentenceSentence ConstraintConstraint

Constraint部分是对用例中的约束进行定义,ConstraintID为约束的标记,Sentence字段中定义约束的有效范围,Constraint字段为约束的内容。The Constraint part is to define the constraints in the use case, the ConstraintID is the tag of the constraint, the effective range of the constraint is defined in the Sentence field, and the Constraint field is the content of the constraint.

d)为整个系统添加一个危害列表d) Add a list of hazards for the whole system

表10:危害列表Table 10: Hazard List

HazardHazard SeveritySeverity ProbabilityProbability FailureFailure

在进行了上述安全扩展后还需要对整个系统维护一张危害列表,通过该列表可以对系统中存在的各类危害,危害严重程度,危害发生概率以及引发危害的失效进行记录。Hazard表示具体的危害,Severity代表危害的严重程度,Probability代表该危害的发生概率,Failure表示引发该危害的失效。After the above-mentioned security extension is carried out, it is also necessary to maintain a hazard list for the entire system. Through this list, various hazards existing in the system, the severity of the hazards, the probability of occurrence of the hazards, and the failures that cause the hazards can be recorded. Hazard represents the specific hazard, Severity represents the severity of the hazard, Probability represents the probability of occurrence of the hazard, and Failure represents the failure that caused the hazard.

在本发明中,有的英文没有指代中文意义的,可以是英文直接翻译成中文所表达的语意。In the present invention, some English words do not refer to Chinese meanings, and the meanings expressed in English can be directly translated into Chinese.

(2)为安全需求模板添加新的限制规则和关键字,(2) Add new restriction rules and keywords to the security requirement template,

为了在易于表达和表达严谨性之间取得平衡,RUCM共设计了26条约束规则,其中16条规则用以约束自然语言的使用,10条规则用以定义10个带有控制结构的活动描述,但这些规则还不能满足软件安全性的相关描述。因此要对标准的RUCM规则进行扩展,本发明中有关安全需求描述的限制规则和关键字如下:In order to strike a balance between ease of expression and expressive rigor, RUCM designed a total of 26 constraint rules, of which 16 rules are used to restrict the use of natural language, and 10 rules are used to define 10 activity descriptions with control structures. But these rules can not meet the relevant description of software security. Therefore, the standard RUCM rules will be expanded, and the restriction rules and keywords described in the present invention are as follows:

R1:当用例的执行者的类型为ExternalSystem或者ExternalInstrument时,ExternalSystem和ExternalInstrument的安全级别应不小于用例的安全级别。R1: When the type of executor of the use case is ExternalSystem or ExternalInstrument, the security level of ExternalSystem and ExternalInstrument should not be less than the security level of the use case.

R2:当用例访问某一资源时,该资源的安全级别应不小于用例的安全级别。R2: When a use case accesses a resource, the security level of the resource should not be lower than that of the use case.

R3:用关键字COLLECT INPUT FROM和DELIEVR OUTPUT TO表示从其他用例或外部设备收集或发送数据,用关键字VIA表示数据通讯时使用的通讯介质。R3: Use the keywords COLLECT INPUT FROM and DELIEVR OUTPUT TO to indicate collecting or sending data from other use cases or external devices, and use the keyword VIA to indicate the communication medium used for data communication.

R4:使用关键字AND表示多个失效共同引发一个危害。R4: Use the keyword AND to indicate that multiple failures together cause a hazard.

R5:使用关键字>、<、=、IN表示约束值的范围,并且用关键字CHECK CONSTRAINT对约束进行检查。R5: Use the keywords >, <, =, IN to indicate the range of constraint values, and use the keyword CHECK CONSTRAINT to check the constraints.

R6:使用关键字RECORD THE FAILURE表示记录一个失效。R6: Use the keyword RECORD THE FAILURE to indicate that a failure is recorded.

R7:使用关键字RETRY FOR..TIMES表示重试操作,可定义重试的次数。R7: Use the keyword RETRY FOR..TIMES to indicate the retry operation, which can define the number of retries.

R8:使用关键字PROPOGATE TO USE CASE表示失效的传播。R8: Use the keyword PROPOGATE TO USE CASE to indicate failure propagation.

R9:当失效传播到另外一个用例进行处理时,该用例的安全级别应该不低于当前用例的安全级别。R9: When the failure propagates to another use case for processing, the safety level of this use case should not be lower than the safety level of the current use case.

R10:每个失效的安全级别由其引发的最严重的危害的严重程度决定,而每个用例的安全级别由其安全级别最高的失效决定。R10: The safety level of each failure is determined by the severity of the most serious hazard it causes, and the safety level of each use case is determined by its highest safety failure.

实施例Example

下面的例子中使用安全需求模板及关键字对安全需求进行了描述。In the following example, security requirements are described using security requirement templates and keywords.

Claims (2)

1.一种适用于航电系统的安全需求建模方法,其包括有下列步骤:1. A safety requirement modeling method applicable to avionics systems, which includes the following steps: 步骤一:建立安全需求的领域概念模型;Step 1: Establish a domain conceptual model of security requirements; 依据RTCA/DO-178B标准对现有航电系统软件进行安全识别创建得到领域概念模型;According to the RTCA/DO-178B standard, the security identification of the existing avionics system software is established to obtain the domain concept model; 步骤二:构建基于UCMeta元模型的航电系统的图形扩展;该航电系统的图形扩展是依据步骤一得到的安全需求的领域概念模型对UCMeta元模型进行扩展而得到;Step 2: Construct the graphic extension of the avionics system based on the UCMeta meta-model; the graphic extension of the avionics system is obtained by extending the UCMeta meta-model based on the domain concept model of security requirements obtained in step 1; 步骤三:构建基于RUCM描述模板的航电系统安全需求模板;该航电系统安全需求模板是在RUCM描述模板上进行添加相关项得到;Step 3: Build an avionics system security requirement template based on the RUCM description template; the avionics system security requirement template is obtained by adding related items to the RUCM description template; 在步骤二中,将领域概念模型转换为UML Profile,对RUCM的元模型UCMeta中进行安全扩展;在Actor中进行细化,对Use Case进行安全性扩展建立SafetyUse Case;分析领域概念模型,确定出安全需求的描述模板以及限制规则和关键字的使用;扩展RUCM描述模板进行安全需求描述,添加10条安全描述规则和若干关键字以保证RUCM的描述完整、准确、无二义性;扩展后的UCMeta创建支持安全需求描述的Use Case Diagram,同时用户通过每一个Use Case都进行了完整准确的功能描述和安全需求描述;In step 2, the domain concept model is converted into UML Profile, and the RUCM meta-model UCMeta is safely extended; refinement is carried out in the Actor, and the SafetyUse Case is established through the security extension of the Use Case; the domain concept model is analyzed to determine the The description template of security requirements and the use of restriction rules and keywords; expand the RUCM description template to describe security requirements, add 10 security description rules and several keywords to ensure that the description of RUCM is complete, accurate, and unambiguous; the expanded UCMeta creates a Use Case Diagram that supports the description of security requirements, and at the same time, the user has carried out a complete and accurate description of the function and security requirements through each Use Case; 其特征在于:It is characterized by: 在Actor中进行细化的步骤有:The steps for refinement in Actor are: 步骤301:根据嵌入式实时系统的特点对Actor进行扩展,将Actor划分为四种类型:Timer、Human Actor、External Instrument和External System;Step 301: Expand the Actor according to the characteristics of the embedded real-time system, and divide the Actor into four types: Timer, Human Actor, External Instrument and External System; 步骤302:在嵌入式实时系统中包含周期性的任务,而Timer则用来触发一个周期性的动作,其属性duration表示该周期的时间长度;其值的类型NFD_Duration包括时间的单位和时间值;Human Actor表示使用触发其相关用例的用户;Step 302: Include periodic tasks in the embedded real-time system, and Timer is used to trigger a periodic action, its attribute duration represents the time length of the cycle; its value type NFD_Duration includes time units and time values; Human Actor represents the user who uses trigger its related use case; 步骤303:External Instrument表示和用例进行数据交换的外部设备,即传感器或信号接收器;其属性direction和signal分别表示数据传输方向和信号类型;Step 303: External Instrument represents an external device that exchanges data with the use case, that is, a sensor or a signal receiver; its attributes direction and signal represent the data transmission direction and signal type, respectively; 步骤304:External System表示和用例进行交互的外部用例、子系统或者系统;Step 304: External System represents an external use case, subsystem or system that interacts with the use case; 步骤305:External Instrument和External System均定义了安全级别;Step 305: Both External Instrument and External System define security levels; 所述的Use Case细化步骤有:The detailed steps of Use Case are: 步骤401:Safety Use Case继承自Use Case;将Safety Use Case定义为实现安全功能的用例,而安全功能则表示对系统或其组成部分的失效进行识别和处理的功能,因此,每一个Safety Use Case须关联到一个或多个失效的识别和处理;Step 401: Safety Use Case is inherited from Use Case; Safety Use Case is defined as a use case for implementing safety functions, and safety functions refer to the function of identifying and processing failures of the system or its components. Therefore, each Safety Use Case Shall be associated with the identification and handling of one or more failures; 步骤402:依据DO-178B标准中对安全级别进行定义和划分,Safety Use Case的安全性级别分为五个等级level-A到level-E,分别对应灾难性的、危险的/严重的、较重的、较轻的、无影响的;Step 402: According to the definition and classification of safety levels in the DO-178B standard, the safety levels of Safety Use Case are divided into five levels from level-A to level-E, corresponding to catastrophic, dangerous/serious, relatively serious heavy, light, unaffected; 所述的安全描述规则为:The described security description rules are: R1:当用例的执行者的类型为ExternalSystem或者ExternalInstrument时,ExternalSystem和ExternalInstrument的安全级别应不小于用例的安全级别;R1: When the type of executor of the use case is ExternalSystem or ExternalInstrument, the security level of ExternalSystem and ExternalInstrument should not be less than the security level of the use case; R2:当用例访问某一资源时,该资源的安全级别应不小于用例的安全级别;R2: When a use case accesses a resource, the security level of the resource should not be lower than the security level of the use case; R3:用关键字COLLECT INPUT FROM和DELIEVR OUTPUT TO表示从其他用例或外部设备收集或发送数据,用关键字VIA表示数据通讯时使用的通讯介质;R3: Use the keywords COLLECT INPUT FROM and DELIEVR OUTPUT TO to indicate collecting or sending data from other use cases or external devices, and use the keyword VIA to indicate the communication medium used for data communication; R4:使用关键字AND表示多个失效共同引发一个危害;R4: Use the keyword AND to indicate that multiple failures jointly cause a hazard; R5:使用关键字>、<、=、IN表示约束值的范围,并且用关键字CHECKCONSTRAINT对约束进行检查;R5: Use the keywords >, <, =, IN to indicate the range of constraint values, and use the keyword CHECKCONSTRAINT to check the constraints; R6:使用关键字RECORD THE FAILURE表示记录一个失效;R6: Use the keyword RECORD THE FAILURE to indicate that a failure is recorded; R7:使用关键字RETRY FOR TIMES表示重试操作的重试次数;R7: Use the keyword RETRY FOR TIMES to indicate the number of retries for the retry operation; R8:使用关键字PROPOGATE TO USE CASE表示失效的传播;R8: Use the keyword PROPOGATE TO USE CASE to indicate failure propagation; R9:当失效传播到另外一个用例进行处理时,该用例的安全级别应该不低于当前用例的安全级别;R9: When the failure is propagated to another use case for processing, the safety level of this use case should not be lower than the safety level of the current use case; R10:每个失效的安全级别由其引发的最严重的危害的严重程度决定,而每个用例的安全级别由其安全级别最高的失效决定。R10: The safety level of each failure is determined by the severity of the most serious hazard it causes, and the safety level of each use case is determined by its highest safety failure. 2.根据权利要求1所述的适用于航电系统的安全需求建模方法,其特征在于航电系统安全需求模板的完整结构为:2. The safety requirement modeling method suitable for avionics systems according to claim 1, characterized in that the complete structure of the avionics system safety requirements template is: FailureID:每个失效的标识号;FailureID: the identification number of each failure; FailureDescription:失效行为的简单描述;FailureDescription: a brief description of the failure behavior; Failure Mode:失效模式,其值为枚举类型;Failure Mode: failure mode, its value is an enumeration type; Failure Cause:失效原因,为引发失效的故障的类型,其值为枚举类型;Failure Cause: failure cause, which is the type of failure that caused the failure, and its value is an enumeration type; Level:失效的安全级别,根据其导致的危害的严重程度确定;Level: The safety level of the failure, determined according to the severity of the harm it causes; Hazard:失效引发的危害名称;Hazard: the name of the hazard caused by failure; FailureMitigate:失效减缓措施;FailureMitigate: failure mitigation measures; Constraint部分是对用例中的约束进行定义,ConstraintID为约束的标记,Sentence中定义约束的有效范围,constraint为约束的内容。The Constraint part is to define the constraints in the use case, ConstraintID is the tag of the constraint, the effective range of the constraint is defined in the Sentence, and constraint is the content of the constraint.
CN201310595322.0A 2013-11-21 2013-11-21 Safety requirement modeling method applicable for avionics system Active CN103853871B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310595322.0A CN103853871B (en) 2013-11-21 2013-11-21 Safety requirement modeling method applicable for avionics system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310595322.0A CN103853871B (en) 2013-11-21 2013-11-21 Safety requirement modeling method applicable for avionics system

Publications (2)

Publication Number Publication Date
CN103853871A CN103853871A (en) 2014-06-11
CN103853871B true CN103853871B (en) 2017-05-24

Family

ID=50861523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310595322.0A Active CN103853871B (en) 2013-11-21 2013-11-21 Safety requirement modeling method applicable for avionics system

Country Status (1)

Country Link
CN (1) CN103853871B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461882B (en) * 2014-11-29 2017-05-17 中国航空工业集团公司第六三一研究所 Method for model verification of software conforming to DO-178B/C A level
CN104965956B (en) * 2015-07-16 2017-11-21 北京航空航天大学 A kind of requirements verification method based on RUCM
CN105373650B (en) * 2015-10-15 2018-09-28 北京航空航天大学 IMA dynamic restructuring modeling methods based on AADL
CN105976080A (en) * 2016-03-24 2016-09-28 中国人民解放军装甲兵工程学院 Combat command control flow modeling method
CN106020826B (en) * 2016-05-23 2019-04-02 北京航空航天大学 A kind of safe case modeling method based on template
CN107590339B (en) * 2017-09-14 2020-05-01 西北工业大学 Comprehensive modular avionics system performance degradation modeling and simulation method
CN109783870B (en) * 2018-12-18 2020-12-29 北京航空航天大学 A Risk Scene Recognition Method for Human-Computer Interaction Based on Formal Verification
CN111984229B (en) * 2020-07-24 2022-02-01 南京航空航天大学 Method for generating formal demand model for field natural language demand
CN112306476B (en) * 2020-11-03 2023-04-14 中国航空工业集团公司西安航空计算技术研究所 Embedded system security modeling method
CN112612241B (en) * 2020-12-15 2021-09-28 中国航空综合技术研究所 Safety analysis method for software of field programmable logic device of aviation equipment
CN114692588B (en) * 2022-03-22 2024-12-13 广西师范大学 An extension method based on semi-structured natural language EARS requirement template

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894192A (en) * 2010-07-19 2010-11-24 北京航空航天大学 Simulation and Demonstration System and Simulation and Demonstration Method for AFDX Network Design and Verification
CN101908962A (en) * 2009-12-24 2010-12-08 中国航空工业集团公司第六三一研究所 Key management method for integrated avionic system
CN102566443A (en) * 2011-12-29 2012-07-11 中国航空工业集团公司第六三一研究所 Simulation verification system and method for integrated avionics system model based on artifact design description language (ADDL)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908962A (en) * 2009-12-24 2010-12-08 中国航空工业集团公司第六三一研究所 Key management method for integrated avionic system
CN101894192A (en) * 2010-07-19 2010-11-24 北京航空航天大学 Simulation and Demonstration System and Simulation and Demonstration Method for AFDX Network Design and Verification
CN102566443A (en) * 2011-12-29 2012-07-11 中国航空工业集团公司第六三一研究所 Simulation verification system and method for integrated avionics system model based on artifact design description language (ADDL)

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Ensuring Safety of Avionics Software at the Architecture Design Level:An Industrial Case Study;Ji Wu,et al;《2013 13th International Conference on Quality Software》;20130730;摘要,正文第1,3部分 *
面向可信的航空嵌入式软件开发方法框架;牛文生 等;《北京航空航天大学学报》;20121231;第38卷(第12期);摘要,第1,4部分) *

Also Published As

Publication number Publication date
CN103853871A (en) 2014-06-11

Similar Documents

Publication Publication Date Title
CN103853871B (en) Safety requirement modeling method applicable for avionics system
Delange et al. Architecture fault modeling with the AADL error-model annex
Biggs et al. A profile and tool for modelling safety information with design information in SysML
Feiler et al. Dependability modeling with the architecture analysis & design language (AADL)
Clark et al. A study on run time assurance for complex cyber physical systems
AU2014208308A1 (en) Safety analysis of a complex system using component-oriented fault trees
US11138063B1 (en) Integrated system failure analysis software toolchain (IS-FAST)
Feiler et al. Automated fault tree analysis from aadl models
Zhao et al. Safety assessment of the reconfigurable integrated modular avionics based on STPA
CN113590094A (en) One-stop task development, deployment, operation and maintenance platform system, method, device, storage and storage medium based on Flink
Dauer et al. Monitoring with verified guarantees
Parri et al. FaultFlow: a tool supporting an MDE approach for timed failure logic analysis
Wu et al. A modeling methodology to facilitate safety‐oriented architecture design of industrial avionics software
Feiler et al. Architecture fault modeling and analysis with the error model annex, version 2
Abid et al. A formal framework to specify and verify real-time properties on critical systems
Bak et al. Verifying cyber-physical systems by combining software model checking with hybrid systems reachability
Lu et al. Model-based static source code analysis of java programs with applications to android security
Zalewski et al. Safety of computer control systems: challenges and results in software development
Hsiung et al. Model checking safety-critical systems using safecharts
Luo et al. Applying sofl to a railway interlocking system in industry
Stamenkovich et al. Formal assurances for autonomous systems without verifying application software
Luckey et al. QUAASY: Quality assurance of adaptive systems
Farrell et al. Adventures in FRET and Specification
Gabsi et al. EMA2AOP: from the AADL error model annex to aspect language towards fault tolerant systems
Gharib et al. IQCPSoS: A Model-Based Approach for Modeling and Analyzing Information Quality Requirements for Cyber-Physical System-of-Systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant