SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Dependability requirements engineering,[object Object]
Objectives,[object Object],To introduce dependability requirements, which are of particular significance for large-scale systems,[object Object],To discuss the notion of safety-critical information systems and to introduce an exemplar system concerned with healthcare records management,[object Object],To discuss an approach to dependability requirements derivation based on viewpoints and concerns that is geared to discovering requirements conflicts,[object Object]
System dependability,[object Object],A system may be considered to be dependable if it operates without interruption, delivers the services that are expected by stakeholders, does not have adverse effects on the system’s environment and does not damage its data or the system itself. ,[object Object],Dependability covers:,[object Object],Reliability,[object Object],Availability,[object Object],Safety,[object Object],Security,[object Object]
Dependability requirement types,[object Object],Non-functional requirements,[object Object],Requirements that specify the dependability properties of the system,[object Object],The Probability of Failure on Demand of the Protection system shall be 0.0001,[object Object],Functional requirements,[object Object],Requirements that are introduced in order to achieve dependability as distinct from requirements that reflect the functionality that is used by system stakeholders,[object Object],All data that is maintained on local disks must be encrypted,[object Object]
Integrated requirements engineering,[object Object],Dependability requirements are business requirements so dependability requirements engineering should not be a separate process but should be part of the system requirements engineering process,[object Object],Dependability issues should be considered alongside other business requirements – dependability should not be compromised but the best way to improve dependability might be to change other system requirements,[object Object],In this lecture, I will focus on safety requirements engineering but the approach proposed is equally applicable to other dependability requirements,[object Object]
Rationale,[object Object],Safety is not an isolated system property but must be considered in conjunction with other properties such as integrity and timeliness,[object Object],Requirements conflicts and trade-offs are harder to make when safety requirements are distinguished in some way,[object Object],Risks and hazards, especially for information systems, cannot be identified until you have some knowledge of the system requirements,[object Object]
Safety-critical information systems,[object Object],The safety-critical systems community has focused its attention on safety-critical control systems,[object Object],In those systems, the actual damage that is caused results from undesirable behaviour of the equipment that is being controlled,[object Object],Increasingly, however, information systems are safety-critical in that system failure results in indirect risks to people,[object Object],Other systems (not necessarily equipment but also human systems) may rely on an information system for their correct functioning. Failure of these systems may then lead to damage,[object Object]
Examples,[object Object],Design systems,[object Object],Failure of CAD systems that are used to design critical hardware and software may lead to the failure of the systems that have been designed,[object Object],A story in the 1970s suggested that a number of plane crashes were a result of errors in a structural analysis program which resulted in structural weaknesses in the airframe,[object Object],Records systems,[object Object],Incorrect information or unavailability of records systems may mean that users of these systems take actions that are potentially dangerous,[object Object],If a maintenance record for an aircraft is incorrect, parts that have reached the end of their design life may not be replaced,[object Object],Simulation systems,[object Object],Simulation systems that do not match the real environment may result in incorrect design decisions or misplaced confidence in the integrity of the system,[object Object]
Secondary risks,[object Object],In control systems, the risks (primary risks) are determined from the characteristics of the equipment that is being controlled,[object Object],This doesn’t mean that risk assessment is easy but it does provide boundaries for the risk assessment and helps identify information sources,[object Object],In information systems, the risks are secondary risks (ie they result from the use of some other dependent system),[object Object],As there may be many dependent systems, identifying risks is consequently more difficult,[object Object]
Hazard classes,[object Object],Data hazards, namely hazards that are associated with the data processed by the system, are the major type of hazard in information systems,[object Object],Control hazards, hazards that are associated with the software controlling the system are also significant,[object Object]
Secondary risk example,[object Object],An electronic health record in a hospital may be used in:,[object Object],Diagnostic processes,[object Object],Anaesthetic processes,[object Object],Treatment processes,[object Object],Discharge processes,[object Object],A failure in that system associated with an individual record may be non-critical for some of these processes but critical for others,[object Object]
Control systems and information systems,[object Object],Control systems are becoming increasingly data intensive as more and more operational data is stored and used,[object Object],Control systems are increasingly being directly connected to information systems so that failure of the information system is a hazard for the control system.  This type of hazard can be difficult to manage,[object Object]
The MHCPMS,[object Object],This system (not its real name but a real system) is a generic medical information system that is configured for use in different regional health trusts,[object Object],It supports the management of patients suffering from mental health problems and provides information on their treatment to health service managers,[object Object]
System goals,[object Object],To provide management information that allows health service managers to assess performance against local and government targets,[object Object],To provide medical staff with timely information to facilitate the treatment of patients,[object Object]
Mental health care,[object Object],Patients do not always attend the same clinic but may attend in different hospitals and local health centres,[object Object],Patients may be confused and disorganised, miss appointments, deliberately or accidentally lose medication, forget instructions and make unreasonable demands on staff,[object Object],Mental health care is safety-critical as a small number of patients may be a danger to themselves and others,[object Object]
Concerns,[object Object],Safety should be considered as an organisational goal and should be considered in conjunction with other organisational goals and business requirements,[object Object],Concerns are a general mechanism that we have devised that are used to reflect organisational goals,[object Object],They also reflect constraints on the organisation that reflect the environment in which the organisation operates,[object Object],They help focus the requirements engineering process and provide a basis for conflict analysis,[object Object]
Concerns,[object Object],Are issues that an organisation must pay attention to and that are systemic ie they apply to the system as a whole,[object Object],They are cross-cutting issues that may affect all system stakeholders,[object Object],Help bridge the gap between organisational goals and system requirements,[object Object],May exist at a number of levels so may be decomposed into more specific sub-concerns,[object Object]
Concerns,[object Object],Software and hardware,[object Object],Operators,[object Object],The organisation,[object Object],Society,[object Object],Safety,[object Object],Security,[object Object],Cost,[object Object]
Concerns and safety analysis,[object Object],Concerns are completely compatible with safety analysis as discussed earlier,[object Object],However, they provide a mechanism where safety can be integrated with other critical system requirements,[object Object],They help highlight trade-offs that may have to be made and conflicts that may arise,[object Object]
Concerns in the MHCPMS,[object Object],The principal concerns in the MHCPMS are:,[object Object],Safety - the system should help reduce the number of occasions where patients cause harm to themselves and others,[object Object],Privacy - patient privacy must be maintained according to the provisions of the Data Protection Act and local ethical guidelines,[object Object],Information quality - the information maintained by the system must be accurate and up-to date,[object Object],Operational costs - the operational costs of the system must be ‘reasonable’,[object Object]
Concern decomposition,[object Object],Concerns are decomposed into sub-concerns:,[object Object],Information integrity,[object Object],Information quality,[object Object],Information accuracy,[object Object],Information timeliness,[object Object]
The safety concern,[object Object],Accidental self-harm,[object Object],Patient safety,[object Object],Deliberate self-harm,[object Object],Staff safety,[object Object],Incorrect treatment,[object Object],Safety,[object Object],Adverse reaction to medication,[object Object],Public safety,[object Object],Mental Health Act,[object Object]
Concern identification,[object Object],The process of establishing concerns is probably best done in a series of meetings involving business managers and technical staff,[object Object],Brainstorming or a similar technique may be used,[object Object],Analysis of concerns between meetings is essential and someone should take an explicit action to do this,[object Object],Several meetings over a relatively short period of time are required for this stage,[object Object]
From concerns to questions,[object Object],A problem that I find with hazard analysis is the ‘requirements gap’. You identify the hazards and possible root causes but there is no method for going from there to requirements,[object Object],To address this, we proposed that, after sub-concerns are identified, you should then explicitly identify questions and sub-questions associated with each concern,[object Object],Answers to these questions come from system stakeholders and help generate system requirements,[object Object]
Generic questions,[object Object],What information relates to the sub-concern being considered?,[object Object],Who requires the information and when do they require it?,[object Object],How is the information delivered?,[object Object],What constraints does the (sub) concern impose?,[object Object],What are the consequences of failing to deliver this information?,[object Object]
Deliberate self-harm sub-concern,[object Object],Information about previous history of self-harm or threats of self-harm,[object Object],Medical staff during consultations. Relatives and carers,[object Object],Can be delivered to medical staff directly through the system. Delivered to relatives and carers through a message from the clinic,[object Object],No obvious constraints imposed,[object Object],Failing to deliver may mean an incident of preventable self-harm occurs,[object Object]
Concern-cross checking,[object Object],A generic problem in complex systems is requirements conflicts where different system requirements are mutually contradictory,[object Object],In my view, separating safety analysis in the RE process increases the likelihood of conflict and the costs of resolving that conflict,[object Object],Concerns partially address this problem as it allows cross-checking at a higher level of abstraction than the requirements themselves,[object Object]
Concern comparison,[object Object],Concerns should be compared in pairs to assess the likelihood of of potential conflicts,[object Object],Safety and information quality,[object Object],Conflicts only likely if the requirements allow erroneous or out of date information to be maintained in the system,[object Object],Safety and privacy,[object Object],Privacy may impose limits on what information can be shared and who can access that information. Requirements on information sharing and access should be checked,[object Object],Safety and operational costs,[object Object],Operational processes that require extensive staff time may be problematic,[object Object]
The privacy concern,[object Object],All information in the system that relates to identifiable individuals is covered by the Data Protection Act,[object Object],All staff need to be aware of the requirements imposed by the Act,[object Object],There are no information delivery requirements,[object Object],Personal information may only be disclosed to accredited information users,[object Object],Failure to address the concern could result in legal action against the Trust,[object Object]
A requirements conflict,[object Object],To reduce the likelihood of deliverate self-harm, the patient’s relatives should be informed of incidents or threats of self-harm,[object Object],Information may only be disclosed to accredited information users,[object Object],The privacy concern conflicts with the safety concern,[object Object]
Requirements derivation,[object Object],Requirements are derived from the answers to the questions associated with concerns.,[object Object],However, there is not a simple 1:1 relationship between answers and requirements,[object Object],By using answers to questions, the problem of stakeholders suggesting requirements that are too specific is reduced,[object Object]
MHCPMS requirements,[object Object],The system shall provide fields in each patient record that allow details of incidents or threats of deliberate self-harm to be maintained,[object Object],The records of patients with a record of deliberate self-harm shall be highlighted to bring them to the attention of clinical system users,[object Object],The system shall only permit the transmission of personal patient information to accredited staff and to the patient themselves,[object Object]
Key points,[object Object],An increasing number of information systems of various kinds are safety critical systems,[object Object],Concerns are a mechanism that allows safety to be integrated with other business requirements,[object Object],Concerns are decomposed to sub-concerns and questions that then drive the requirements engineering process,[object Object],The DISCOS method is a spiral model of requirements engineering for critical systems that integrates concerns, requirements and system architectural design,[object Object]

Más contenido relacionado

La actualidad más candente

Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramKumar
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and DesignDr. C.V. Suresh Babu
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality FactorsUsman Khan
 
Hospital management-system-use-case-diagram
Hospital management-system-use-case-diagramHospital management-system-use-case-diagram
Hospital management-system-use-case-diagramabdulrehman176095
 
Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)Amin Bandeali
 
Quality attributes in software architecture
Quality attributes in software architectureQuality attributes in software architecture
Quality attributes in software architectureHimanshu
 
Software analysis and it's principles
Software analysis and it's principlesSoftware analysis and it's principles
Software analysis and it's principlesGhulam Abbas
 

La actualidad más candente (20)

CDMS-PPT-fzq94g.pptx
CDMS-PPT-fzq94g.pptxCDMS-PPT-fzq94g.pptx
CDMS-PPT-fzq94g.pptx
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML Designing
 
Chapter1
Chapter1Chapter1
Chapter1
 
System modeling
System modelingSystem modeling
System modeling
 
Laudon Ch09
Laudon Ch09Laudon Ch09
Laudon Ch09
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
 
CS8080 IRT UNIT I NOTES.pdf
CS8080 IRT UNIT I  NOTES.pdfCS8080 IRT UNIT I  NOTES.pdf
CS8080 IRT UNIT I NOTES.pdf
 
Ch7 implementation
Ch7 implementationCh7 implementation
Ch7 implementation
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
CMMI
CMMICMMI
CMMI
 
Chap01
Chap01Chap01
Chap01
 
Ch6 - Architectural Design
Ch6 - Architectural DesignCh6 - Architectural Design
Ch6 - Architectural Design
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality Factors
 
System Modelling
System ModellingSystem Modelling
System Modelling
 
Heuristic evaluation principles
Heuristic evaluation principlesHeuristic evaluation principles
Heuristic evaluation principles
 
Hospital management-system-use-case-diagram
Hospital management-system-use-case-diagramHospital management-system-use-case-diagram
Hospital management-system-use-case-diagram
 
Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)
 
Quality attributes in software architecture
Quality attributes in software architectureQuality attributes in software architecture
Quality attributes in software architecture
 
Software analysis and it's principles
Software analysis and it's principlesSoftware analysis and it's principles
Software analysis and it's principles
 

Similar a L5 Dependability Requirements

Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachGraydon McKee
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16koolkampus
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
unit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptxunit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptxGarimaSrivastava93
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systemsAHMED ZINHOM
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxArti Parab Academics
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR SystemHal Amens
 
Assessing IT Systems for Health Information Management Overview In.docx
Assessing IT Systems for Health Information Management Overview In.docxAssessing IT Systems for Health Information Management Overview In.docx
Assessing IT Systems for Health Information Management Overview In.docxstudywriters
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
Health Current Toolkit Paper
Health Current Toolkit PaperHealth Current Toolkit Paper
Health Current Toolkit PaperKim Isleb
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 

Similar a L5 Dependability Requirements (20)

L7 Design For Recovery
L7 Design For RecoveryL7 Design For Recovery
L7 Design For Recovery
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
Ch10
Ch10Ch10
Ch10
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
unit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptxunit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptx
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptx
 
Ch9
Ch9Ch9
Ch9
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR System
 
Assessing IT Systems for Health Information Management Overview In.docx
Assessing IT Systems for Health Information Management Overview In.docxAssessing IT Systems for Health Information Management Overview In.docx
Assessing IT Systems for Health Information Management Overview In.docx
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
Health Current Toolkit Paper
Health Current Toolkit PaperHealth Current Toolkit Paper
Health Current Toolkit Paper
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
BPM in Healthcare
BPM in HealthcareBPM in Healthcare
BPM in Healthcare
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 

Último

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 

Último (20)

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 

L5 Dependability Requirements

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.