接続数

COUNTER163207From 2011/5/25

HAZOP diary(安全分析日誌)

HAZOP >> 記事詳細

2018/12/15

HAZOP papers 1-10

Tweet ThisSend to Facebook | by kaizen
for HAZOP Survey Paper

(1) In Title
(2) In Text
(3) In Reference
の3種類に分類しながら1000文献を収集予定。

HAZOP papers references1-10
HAZOP papers references 11-20
HAZOP papers references 21-22a
HAZOP papers references 22b
HAZOP papers references 23
HAZOP papers references 24-30
HAZOP papers references 31-35
HAZOP papers references 36-40
HAZOP papers references 41,43-45
HAZOP papers ref(42)
HaZOP papers references 46-50
HaZOP papers references 64-65
HaZOP papers references 66-70
HAZOP papers references 71-75
HAZOP papers references 75-80
HAZOP papers references 81-85
HAZOP papers references 86-90
HAZOP papers references 91-95
HAZOP papers references 96-100


1)
Applying HAZOP to Software Engineering Models , Peter Fenelon , Y Dd , Barry Hebbron,  Risk Management And Critical Protective Systems: Proceedings of SARSS 1994  (1994)
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.6073&rank=1


REFERENCES
[1] A guide to Hazard and Operability Studies, Chemical Industries Association Limited 1987
[2] Kletz, T., HAZOP and HAZAN
[3] Lloyd’s Register Workshop on Failure Analysis Techniques, proceedings not available
[4] Minutes of Hazard Identification and Analysis Interest Group meetings. School of Computing and Maths, University of Teesside.
[5] McDermid, J. A., Issues And Trends In The Development Of Software for Safety Critical Systems, University of York technical report YCS138
[6] Fenelon, P. & McDermid, J., A. An Integrated Toolset For Software Safety Assessment, Journal of Systems And Software, July 1993
[7] Chudleigh, M., Hazard Analysis Using HAZOP: A Case Study, in Proceedings of SAFECOMP 93.
[8] Earthy, J. V., Hazard and Operability Studies As An Approach To Software Safety Assessment, in Proceedings of IEE Computing and Control Division Colloquium on Hazard Analysis, IEE, November 1992
[9] Burns, D. J. & Pitblado, R. M., A Modified Methodology For Safety Critical Systems Assessment, in F. Redmill & T. Anderson, eds, Directions in safety critical systems: SCS Symposium, Bristol, 1993 (Springer-Verlag)
[10] McDermid, J. A & Pumfrey, D. J., A Development of Hazard Analysis To Aid Software Design, COMPASS ‘94
[11] Bondavalli, A. & Simoncini, L. Failure Classification With Respect To Detection, in First Year report, TASK B : Specification and Design for Dependability, Volume 2. ESPRIT BRA Project 3092: Predictably Dependable Computing Systems.
[12] Ezhilchelvan, P. D. & Shrivastava, S. K., A Classification Of Faults In Systems, University of Newcastle upon Tyne.
[13] Andow P. Guidance on HAZOP Procedures for Computer Controlled Plants, KBC Process Technology, ISBN 0-7176-0367-9
[14] An Introduction to Software Hazard and Operability Procedures, ICI 1988.
[15] Feasibility study for MoD PES HAZOP, MoD Ref NSM 13C/1063, 1994
[16] Feasibility study for MoD PES HAZOP, MoD Ref NSM 13C/1062, 1994
[17] Fenelon, P., McDermid, J. A., Pumfrey, D. & Nicholson, M., Towards Integrated Safety Analysis And Design, ACM Applied Computing Review, August 1994
[18] Fencott, P.C. & Hebbron, B. D., The Application Of Hazop Studies To Integrated Requirements Models For Control Systems, to appear in proceedings of SAFECOMP94
[19] Fencott, P. C. et. al., Formalising the semantics of Ward and Mellor SA/RT essential Models using a Process Algebra. University of Teesside
[20] Fencott, P. C. et al. Experiences With The Integration Of Structured And Formal Methods For Real Time Systems Specifications, University of Teesside
[21] Hunt J. R. Designing Ladder Logic From State Transition Diagrams; and also, Polymer Handling: A Worked Example, ICI Eutech

34Failure Classification with respect to Detection, Specification and Design for Dependability - Bondavalli, Simoncini - 1990 (Show Context)
11Formalising the semantics of Ward/Mellor SA/RT essential models using a process algebra. volume 873 - Fencott, Galloway, et al. - 1994 (Show Context)
8and Operability Study as an Approach to Software Safety Assessment - Earthy, ‘‘Hazard - 1992 (Show Context)
8The application of HAZOP studies to integrated requirements models fbr control systenrs - Fencott, Hebbron - 1995 (Show Context)
3An Integrated Toolset for Software Safety Assessment - Fenelon, McDermid - 1993 (Show Context)
3A Development of Hazard Analysis to - McDermid, Pumfrey - 1994 (Show Context)
2Hazard Analysis Using Hazop: A Case Study - Chudleigh - 1993 (Show Context)
2A Classification Of Faults - Ezhilchelvan, Shrivastava - 1986 (Show Context)
1Issues And Trends - McDermid (Show Context)
1A Modified Methodology For Safety Critical Systems Assessment - Burns, Pitblado - 1993 (Show Context)
1et al. Experiences With The Integration Of Structured And Formal Methods For Real Time Systems Specifications - Fencott (Show Context)
1Designing Ladder Logic From State Transition Diagrams; and also, Polymer Handling: A Worked Example - Hunt (Show Context)

2)Experience with the application of HAZOP to computer-based systems, J. A. Mcdermid , M. Nicholson , D. J. Pumfrey , P. Fenelon,  COMPASS '95: Proceedings of the Tenth Annual Conference on Computer Assurance, 1995, pp. 37-48.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.38.1568&rank=2


REFERENCES
[1] J. A. McDermid and D. J. Pumfrey, “A development of hazard analysis to aid software design”, in COMPASS ’94: Proceedings of the Ninth Annual Conference on Computer Assurance. IEEE / NIST, Gaithersburg, MD, June 1994, pp. 17–25.
[2] CISHEC, A Guide to Hazard and Operability Studies, The Chemical Industry Safety and Health Council of the Chemical Industries Association Ltd., 1977.
[3] T. Kletz, Hazop and Hazan: Identifying and Assessing Process Industry Hazards, Institution of Chemical En- gineers, third edition, 1992.
[4] A. Bondavalli and L. Simoncini, “Failure classification with respect to detection”, in First Year Report, Task B: Specification and Design for Dependability, Volume 2. ESPRIT BRA Project 3092: Predictably Dependable Computing Systems, May 1990.
[5] H. R. Simpson, “Methodological and notational con- ventions in DORIS real time networks”, British Aerospace Dynamics Division, Feb. 1993.
[6] MoD, Draft Defence Standard 00 – 56: Safety Man- agement Requirements for Defence Systems Containing Programmable Electronics, Ministry of Defence, Feb. 1993.
[7] G. P. Mullery, “CORE — a method for COntrolled Re- quirements Expression”, in System and Software Re- quirements Engineering, R. H. Thayer and M. Dorfman, Eds., pp. 304–313. IEEE Press, 1987.
[8] P. Fenelon and J. A. McDermid, “An integrated toolset for software safety analysis”, Journal of Systems and Software, pp. 2/1–2/16, Mar. 1993.
[9] P. Fenelon and B. D. Hebbron, “Applying HAZOP to software engineering models”, in Risk Management And Critical Protective Systems: Proceedings of SARSS 1994, Altrincham, England, Oct. 1994, pp. 1/1–1/16, The Safety And Reliability Society.
[10] P. Fenelon and J. A. McDermid, “Integrated techniques for software safety analysis”, in Proceedings of the IEE Colloquium on Hazard Analysis. Nov. 1992, Institution of Electrical Engineers.
[11] P.D.EzhilchelvanandS.K.Shrivastava,“Aclassifica- tion of faults in systems”, University of Newcastle upon Tyne, 1989.
[12] B. A. Carre and T. J. Jennings, “A subset of Ada for formal verification (SPARK)”, Ada User, vol. 9, no. (Supplement), pp. 121–126, 1989.
[13] R. Chapman, A. Burns, and A. Wellings, “Integ- rated program proof and worst-case timing analysis of SPARK Ada”, in Proceedings of the ACM SIGPLAN Workshop on Language, Compiler and Tool Support for Real-Time Systems, Orlando, Florida, June 1994.
[14] R. Chapman, “Worst-case timing analysis via finding longest paths in SPARK Ada basic-path graphs”, De- partment of Computer Science Yellow Report YCS 246, University of York, Oct. 1994.
[15] C. Y. Park and A. C. Shaw, “Experiments with a pro- gram timing tool based on source-level timing schema”, IEEE Computer, pp. 48–56, May 1991.
[16] N. C. Audsley, A. Burns, M. F. Richardson, and A. J. Wellings, “STRESS: A simulator for hard real-time sys-
tems”, Software — Practice and Experience, vol. 24, no. 6, pp. 543–564, 1994.
[17] N.H.Roberts,W.E.Vesely,D.F.Haasl,andF.F.Gold- berg, Fault Tree Handbook, Systems and Reliability Research Office of U.S. Nuclear Regulatory Commis- sion, Jan. 1981.
[18] N. G. Leveson and P. R. Harvey, “Software fault tree analysis”, Journal of Systems and Software, vol. 3, pp. 173–181, 1983.
[19] T. De Marco, Structured Analysis and System Specific- ation, Prentice-Hall, 1978.
[20] E. Yourdon and L. L. Constantine, Structured Design: Fundamentals of a Discipline of Computer Program and Systems Design, Prentice-Hall, 1985.
[21] D. T. Jordan, C. J. Locke, J. A. McDermid, B. A. P. Sharpe, I. Toyn, and C. E. Parker, “Literate formal development from Z to Ada for safety critical applica- tions”, in Proceedings of Safecomp 94, V. Maggioli, Ed. 1994, pp. 1–11, Instrument Society Of America.
[22] B. D. Hebbron and P. C. Fencott, “The application of HAZOP studies to integrated requirements models for control systems”, in Proceedings of SAFECOMP ’94, Oct. 1994.
[23] P. Fenelon, J. A. McDermid, M. Nicholson, and D. J. Pumfrey, “Towards integrated safety analysis and design”, ACM Applied Computing Review, Aug. 1994.
[24] A. Burns and J. A. McDermid, “Real-time safety- critical systems: analysis and synthesis”, Software Engineering Journal, vol. 9, no. 6, pp. 267–281, Nov. 1994.

179Experiments with a program timing tool based on source-level timing scheme - Park, Shaw - 1991
45Integrated program proof and worst-case timing analysis of SPARK Ada - Chapman, Burns, et al. - 1994
42STRESS: A Simulator for Hard Real-time Systems - AUDSLEY, BURNS, et al. - 1994
41Hazop and Hazan: Identifying and Assessing Process Industry Hazards - Kletz - 1999
40Towards integrated safety analysis and design - Fenelon, McDermid, et al. - 1994
37A development of hazard analysis to aid software design - McDermid, Pumfrey - 1994
34Failure Classification with respect to Detection, Specification and Design for Dependability - Bondavalli, Simoncini - 1990
28An integrated toolset for software safety analysis - Fenelon, McDermid - 1993
28Software Fault Tree Analysis - Leveson, Harvey - 1983
23CORE: A method for controlled requirements expression - Mullery - 1979
19Structured Design – Fundamentals of a - Yourdon - 1979
13Methodological and notational conventions in doris real-time networks - Simpson - 1994
12A Guide to Hazard and Operability Studies. The Chemical Industry Safety and Health Council of the Chemical Industries Association Ltd. ANALYSIS: A - CISHEC - 1977
11J.A.: Real-time safety-critical systems: analysis and synthesis - Burns, McDermid - 1994
10UK Defence Standard 00-56, Safety Management Requirements for Defence Systems. U.K. Ministry of Defence - MoD - 1996
10Fault Tree Handbook, Systems and Reliability Research, Oƒce of Nuclear Regulatory Commission - Haasl, Roberts, et al. - 1981
7Worst-case timing analysis via finding longest paths in SPARK Ada basic-path graphs - Chapman - 1994
5Integrated techniques for software safety analysis - Fenelon, MacDermid - 1992
3Applying HAZOP to software engineering models - Fenelon, Hebbron - 1994
3A classification of faults in systems", University of Newcastle upon Tyne - Ezhilchelvan, Shrivastava - 1989
3A subset of Ada for formal verification - Carre, Jennings - 1989
2Literate formal development from Z to Ada for safety critical applications - Jordan, Locke, et al. - 1994
1Fencott, "The application of HAZOP studies to integrated requirements models for control systems - Hebbron, C - 1994


3) The rigorous generation of Java mutation operators using HAZOP, Sunwoo Kim , John A. Clark , John A. McDermid, 12TH INTERNATIONAL CONFERENCE ON SOFTWARE & SYSTEMS ENGINEERING AND THEIR APPLICATIONS, ICSSEA'99,  (1999)
8 References
[Agrawal 1989] Agrawal H. et al., Design of Mutant Operators for the C Programming Language, SERC-TR-41-P, Software Engineering Research Center, Purdue University, 1989.
[Beizer 1996] Beizer B., Software System Testing and Quality Assurance, Int. Thomson Computer Press, 1996.
[Delamaro 1997] Delamaro M. et. al., Integration Testing Using Interface Mutations, 1997. [DeMillo 1979] DeMillo R.A., Sayward F.G., Lipton R.J., Program Mutation: A New Approach To Program Testing, Infotech Software Testing Volume 2: Invited Papers, Infotech International Limt., 1979.
[DeMillo 1994] DeMillo R., Mathur A., On the Use of Software Artifacts to Evaluate the Effectiveness of Mutation Analysis for Detecting Errors in Production Software, Software Engineering Research Center, Purdue Univ., 1994.
[Gosling 1996] Gosling J. et al., The Java Language Specification, Addison-Wesley, 1996.
[Hunt 1998] Hunt J., Long F., Java’s reliability: An analysis of software defects in Java, IEE Proceedings Software, Vol. 145, No. 2-3, April-June 1998.
[Kaner 1998] Kaner C. et al., Testing Computer Software, 2nd ed., Int. Thomson Publishing Company, 1998.
[King 1991] King K.N., Offutt A., A Fortran Language System for Mutation-Based Software Testing, Software Practice and Experience, 21(7): 686-718, July 1991.
[Kletz 1992] Kletz T., HAZOP and HAZAN: Identifying and Assessing Process Industry Hazards, 3rd Edition, Hemisphere Publishers; ISBN: 1-560-32276-4, 1992.
[MOD 1995] A Guideline for HAZOP Studies on Systems which include a Programmable Electronic System, Draft Interim Defence Standard 00-58/1, Directorate of Standardization Ministry of Defence, 1995.
[Offutt 1993] Offutt A.J., Rothermel G., An experimental Evaluation of Selective Mutation, Fifteenth International Conference on Software Engineering, p. 100-107, May 1993.
[Offutt 1996a] Offutt A.J. et al, Mutation operators for Ada, ISSE-TR-96-09 Information and software Systems Engineering. George Mason Univ., 1996.
[Offutt 1996b] Offutt.A. J. et al., An Experimental Determination of Sufficient Mutant Operators, ACM Transactions on Software Engineering Methodology 5(2):99-118, April 1996.
[Phipps 1999] Phipps G., Comparing Observed Bug and Productivity Rates for Java and C++, Software Practice and Experience, 29(4), 345-348, 1999.
[Voas 1998] Voas J., Software Fault Injection, John Wiley & Sons, inc., 1998.

1776The Java Language Specification - Gosling, Joy, et al. - 1996 (Show Context)
128An Experimental Determination of Sufficient Mutant Operators - Offutt, Lee, et al. - 1996
124A Fortran language system for mutationbased software testing - King, Offutt - 1991 (Show Context)
58An experimental evaluation of selective mutation - Offutt, Rothermel, et al. - 1993
54Design of mutant operators for the C programming language - Agrawal, DeMillo, et al. - 1989 (Show Context)
33Comparing observed bug and productivity rates for java and c - PHIPPS - 1999 (Show Context)
25Integration Testing using Interface Mutations - Delamaro, Maldonado, et al.
25On the Use of Software Artifacts to Evaluate the Effectiveness of Mutation Analysis for Detecting Errors in Production Software - DeMillo, Mathur - 1994
20Software Fault Injection - Voas, McGraw - 1998
13Hazop and Hazan — Identifying and Assessing - Kletz - 1992 (Show Context)
3et al., Integration Testing Using Interface Mutations - Delamaro - 1997 (Show Context)
2Software System Testing and Quality Assurance, Int - Beizer - 1996 (Show Context)
2Java’s reliability: An analysis of software defects in java - Hunt, Long - 1998 (Show Context)
2et al, Mutation operators for Ada, ISSE-TR-96-09 Information and software Systems Engineering - Offutt - 1996 (Show Context)
1Program Mutation: A New Approach To - DeMillo, Sayward, et al. - 1979 (Show Context)


4)

Security assessments for safety critical systems using hazops, Rune Winther , Ole-arnt Johnsen , Bjørn Axel Gran, In: Proceedings of SAFECOMP 2001  (2001)
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.2634&rep=rep1&type=pdf


References
1. Chemical Industries Association: A guide to Hazard and Operability Studies (1992).
2. Chudleigh M.F., Catmur J.R.: Safety Assessment of Computer Systems Using HA- ZOP and Audit Techniques. Proceedings of Safety of Computer Control Systems,
SAFECOMP (1992). Pergamon Press
3. CORAS IST-2000-25031: A Platform for Risk Analysis of Security Critical Systems.
http://www.nr.no/coras.
4. Dahll, G.: Safety Evaluation of a Train Leader Telephone System. Proceedings of
Computer Safety, Reliability and Security, 18th International Conference, SAFE-
COMP (1999). Springer-Verlag.
5. Laprie J.-C. (Ed.),: Dependability: Basic Concepts and Terminology. IFIP WG 10.4
Dependable Computing and Fault Tolerance, vol. 5. Springer-Verlag (1992).
6. Ministry of Defence: Interim Defence Standard 00-58/1: Hazop Studies on Systems

5)
 Effective security requirements analysis: HAZOP and use cases Thitima Srivatanakul , John A. Clark , Fiona Polack, In Information Security: 7th International Conference, volume 3225 of LNCS, (2004)
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.7072&rank=5

References
1. K. Allenby and T.P. Kelly. Deriving safety requirements using scenarios. In 5th IEEE International Symposium on Requirements Engineering (RE’01). IEEE Com- puter Society Press, 2001.
2. E. Amoroso. Fundamentals of Computer Security Technology. Prentice-Hall, 1994.
3. B.P. Douglass. Real-time UML (2nd ed.): Developing efficient objects for embedded
systems. Addison-Wesley Longman Ltd., 2000.
4. I. Jacobson, M. Christerson, P. Jonsson, and G. Overgaard. Object-Oriented Soft-
ware Engineering: A Use Case Driven Approach. Addison-Wesley, 1992.
5. T.P. Kelly. Arguing Safety - A Systematic Approach to Managing Safety Cases.
PhD thesis, Dept. of Comp. Science, University of York, UK, 1999.
6. D.M. Kienzle and W.A. Wulf. A practical approach to security assessment. In
Proc. of the 1997 New Security Paradigms Workshop, England, 1997.
7. J. McDermott. Abuse-case-based assurance arguments. In 17th Annual Computer
Security Applications Conference., 2001.
8. A.P. Moore. The JMCIS information flow improvement (JIFI) assurance strategy.
Technical Report 500-190, Center for High Assurance Computer Systems Informa-
tion Technology Division, Naval Research Lab., Washington, D.C., May 1997.
9. UK Ministry of Defence. Defence Standard 00-58: HAZOP Studies on Systems
Containing Programmable Electronics. 1996.
10. F. Redmill, M. Chudleigh, and J. Catmur. System Safety: HAZOP and Software
HAZOP. John Wiley & Sons, 1999.
11. N.H. Roberts, W.E. Vesely, D.F. Haasl, and F.F. Goldberg. Fault Tree Handbook.
System and Reliablity Research Office of U.S. Nuclear Regulatory Commission,
Washington, DC., 1981.
12. B. Schneier. Applied Cryptography. John Wiley & Sons, 1996.
13. B. Schneier. Attack Trees. Dr. Dobb’s Journal, 1999.
14. G. Sindre and A.L. Opdahl. Eliciting security requirements by misuse cases. In
Proc. of TOOLS Pacific 2000, pages 120–131, 2000.
15. C. Weissman. Security Penetration Testing Guideline: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems. Technical report, NRL TM-8889/000/01, 1995.
16. R. Winther, O-A. Johnsen, and B.A. Gran. Security assessments for safety critical systems using hazops. In Proc. of SAFECOMP 2001, Budapest, Hungary, 2001.

1254Applied Cryptography - Schneier - 1994
1096Object-Oriented Software Engineering. A Use Case Driven Approach - Jacobson, Christerson, et al. - 1993
133Eliciting security requirements by misuse cases - Sindre, Opdahl - 2000
97Fundamentals of Computer Security - Amoroso - 1994
83Attack trees - Schneier - 1999
32Deriving safety requirements using scenarios - Allenby, Kelly
29Abuse-case-based assurance arguments - McDermott - 2001
23Ministry of Defence. Defence Standard 00-56: The procurement of Safety Critical Software in Defence Equipment - UK - 1995
15A Practical Approach to Security Assessment - Wulf, Kienzle - 1998
7System safety: HazOp and software HazOp - Redmill, Chudleigh, et al. - 1999
4Real-time UML (2nd ed.): Developing efficient objects for embedded systems - Douglass - 2000
1Reliablity Research Office of U.S. Nuclear Regulatory Commission - System - 1981

6) 
HAZOP STUDY ON SEWAGE TREATMENT PLANT AT EDUCATIONAL INSTITUTION, Ashok Kumar. S, Prakash.J, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308, pp.137-139, Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.681.3871&rank=6

REFERENCES
[1]. K. Ikehata, Y. Liu., Land Disposal of WastesReference Module in Earth Systems and Environmental Sciences, from Encyclopedia of Environmental Health, 2011, Pages 353- 361, Current as of 30 July 2012
[2]. Fengwang et.al., (2012)” A novel knowledge database construction method for operation guidance expert system based on HAZOP analysis and accident analysis “journal of loss prevention in the process industries”.vol 25,pp 905-915. [3]. Faisal I khan et.al.,(2000)” Towards automation of HAZOP with a new tool EXPERTOP” environmental modeling & software vol 15 , pp 67-77.
[4]. NettaLiinRossing, Morten Lind, Niels Jensen, Sten Bay Jørgensen.,(2009)”A goal based HAZOP assistant” Computer Aided Chemical Engineering, Volume 26, 2009, Pages 1129-1134

1Disposal of WastesReference Module - Ikehata, Liu, et al. - 2012
1A novel knowledge database construction method for operation guidance expert system based on HAZOP analysis and accident analysis “journal of loss prevention in the process industries”.vol 25,pp - al - 2012
1Bay Jørgensen.,(2009)”A goal based HAZOP assistant - NettaLiinRossing, Jensen, et al.

7)
Hazop Study for Process Plants: A Generalized Approach,  Smera Maria Poulose , G Madhu, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 7, July 2012), 
http://citeseerx.ist.psu.edu/viewdoc/citations?doi=10.1.1.413.4275

REFERENCES
[1] Chemical Industries Association, A Guide to Hazard and Operability Studies, Alembic House, London, 1977.
[2] F.P lees, Loss Prevention in Process Industries, Volume1
[3] Guidelines for Hazard Evaluation Procedures, Center for Chemical Process Safety, American Institute of Chemical Engineers, 1985.

8)
HAZOP Analysis of UML-Based Software Architecture Descriptions of Safety-Critical Systems, Klaus Marius , Hansen Lisa Wells , Thomas Maier, Proceedings of NWUML 2004
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.150&rank=8

References
[1] L. Bass, P. Clements, and R. Kazman. Software Architecture in Practice. Addison-Wesley, 2 edition, 2003.
[2] C++ in Safety Critical Systems, http://hissa.ncsl.nist.gov/sw_develop/ir5769/ir5769.l.html.
[3] P. Clements, F. Bachmann, L. Bass, D. Garlan, J. Ivers, and R. Little. Doc- umenting Software Architectures: Views and Beyond. Addison-Wesley, 1st edition, 2002.
[4] P. Clements, R. Kazman, and M. Klein, editors. Evaluating Software Archi- tectures: Methods and Case Studies. Addison-Wesley, 2002.
[5] A. Cockburn, editor. Writing Effective Use Cases. Addison-Wesley, 2001.
[6] G. Dahll. Safety evaluation of a train leader telephone system. In SAFE-
COMP’99, volume 1698 of LNCS. Springer, 1999.
[7] A. Hussey. HAZOP analysis of formal models of safety-critical interac- tive systems. In F. Koornneef and M. van der Meulen, editors, SAFECOMP 2000, volume 1943 of LNCS. Springer, 2000.
[8] International Electrotechnical Commission. Functional Safety of Electrical/ Electronic/ Programmable Electronic Safety-Related Systems, 1st edition, 1998-2000. International Standard IEC 61508, Parts 1-7.
[9] P. Johannessen, C. Grante, A. Alminger, U. Eklund, and J. Torin. Hazard analysis in object oriented design of dependable systems. In Proceedings of the International Conference on Dependable Systems and Networks. IEEE, 2001.
[10] J. Jürjens. Developing safety-critical systems with UML. In P. Stevens et al., editors, Proceedings of UML 2003, volume 2863 of LNCS. Springer Verlag, 2003.
 5
http://www.isis.alexandra.dk/software
22
[11] P. Kruchten. The 4+1 view model of architecture. IEEE Software, 12(6), 1995.
[12] K. Lano, D. Clark, and K. Androutsopoulos. Safety and security analysis of object-oriented models. In S. Anderson et al., editors, Computer Safety, Reliability and Security: SAFECOMP, volume 2434 of Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
[13] N. Leveson. Safeware: System Safety and Computers. Addison-Wesley, 1995.
[14] N. G. Leveson, M. P. E. Heimdahl, and J. D. Reese. Designing specifica- tion languages for process control systems: Lessons learned and steps to the future. In ESEC / SIGSOFT FSE, 1999.
[15] Ministry of Defence. HAZOP studies on systems containing programmable electronics. Defence Standard 00-58, Parts 1 and 2, Issue 2, May 2000.
[16] J. McDermid, M. Nicholson, D. Pumfrey, and P. Fenelon. Experience with the application of HAZOP to computer-based systems. In Computer Assur- ance. COMPASS ’95. IEEE, 1995.
[17] Object Oriented Technology in Aviation, http://shemesh.larc.nasa.gov/foot/.
[18] OMG.UnifiedModelingLanguageDiagramInterchange2.0.FinalAdopted Specification. Technical Report ptc/03-09-01, Object Management Group, 2003.
[19] OMG. Unified Modeling Language specification 1.5. Technical Report formal/2003-03-01, Object Management Group, 2003.
[20] D. Reifer. Software Failure Modes and Effects Analysis. IEEE Transactions on Reliability, R-38(3), 1979.
[21] Software Engineering Standards Committee. IEEE recommended practice for architectural description of software-intensive systems. Technical Report IEEE Std 1471-2000, IEEE Computer Society, 2000.

738Safeware - System Safety and Computers - Leveson - 1995
549The 4+1 view model of architecture - Kruchten - 1995 (Show Context)
499Writing Effective Use Cases - Cockburn - 2000 (Show Context)
211Evaluating Software Architectures: Methods and Case Studies - Clements, Kazman, et al. - 2002 (Show Context)
33Designing specification languages for process control systems: Lessons learned and steps to the future - Leveson, Heimdahl, et al. - 1999 (Show Context)
32Experience with the application of HAZOP to computer-based systems - McDermid, Nicholson, et al. - 1995
28Software Failure Modes and Effects Analysis - Reifer - 1979
15Developing safety-critical systems with UML - Jürjens - 2003 (Show Context)
11Hazard Analysis in Object Oriented Design of Dependable Systems - Johannessen, Grante, et al. - 2001 (Show Context)
5Safety and security analysis of object-oriented models - Lano, Clark, et al. - 2002 (Show Context)
4HAZOP Analysis of Formal Models of Safety-Critical Interactive Systems - Hussey - 2000 (Show Context)
3Modeling Language specification 1.5 - Unified - 2003 (Show Context)
2Safety evaluation of a train leader telephone system - Dahll - 1999 (Show Context)
1Modeling Language Diagram Interchange 2.0. Final Adopted Specification - Unified - 2003 (Show Context)

9)
HAZOP Analysis Management System with Dynamic Visual Model Aid, Nan Bin Mad Sahar , Syahril Ardi , Suzuki Kazuhiko , Munesawa Yoshiomi , Minowa Hirotsugu, American Journal of Applied Sciences 7 (7): 943-948, 2010 ISSN 1546-9239
© 2010 Science Publications
https://thescipub.com/PDF/ajassp.2010.943.948.pdf

REFERENCES
Cheetam, W., S. Shiu, O. Rosina and O. Weber, 2006. Soft case-based reasoning. Knowl. Eng. Rev., 20: 267-269.
Cui, L., J. Zhao, T. Qiu and B. Chen, 2008. Layered digraph model for HAZOP analysis of chemical processes. Process Safe. Prog., 27: 293-305. DOI: 10.1002/prs.10266
López-Arévalo, I., R. Ban Ares-Alcantara, A. Aldea, A. Rodriguez-Martinez and L. Jimenez, 2007. Generation of process alternatives using abstract models and casebased reasoning. Comput. Chem. Eng., 31: 902-918. DOI: 10.1016/j.compchemeng.2006.08.011
Pedersen, T., S.V.S. Pakhomov, S. Patwardhan and C. Chute, 2007. Measure of semantic similarity and relatedness in biomedical domain. J. Biomed. Inform., 40: 288-299. DOI: 10.1016/j.jbi.2006.06.004
Shimada, Y., K. Suzuki and H. Sayama, 1996. Computer-aided operability study. Comput. Chem. Eng., 20: 905-913. DOI: 10.1016/0098- 1354(95)00187-5
Venkatasubramanian, V., J. Zhao and S. Viswanathan, 2000. Intelligent systems for HAZOP analysis of complex process plants. Comput. Chem. Eng., 24: 2291-2302. DOI: 10.1016/S0098- 1354(00)00573-1
Zhao, C., M. Bhushan and V. Venkatasubramanian, 2003. Roles of ontology in automated process safety analysis. Comput. Aid. Chem. Eng., 14: 341-346. DOI: 10.1016/S1570-7946(03)80138-4
Zhao, C., M. Bhushan and V. Venkatasubramanian, 2005. PHASUITE: An automated HAZOP analysis tool for chemical processes part I. Knowl. Eng. Framework Process Safe. Environ. Prot., 83: 509-532. DOI: 10.1205/psep.04055

29Foundations of soft case-based reasoning - Pal, Shiu - 2004 (Show Context)
4Intelligent systems for HAZOP analysis of complex process plants - Venkatasubramanian, Zhao, et al. - 2000 (Show Context)
1Layered digraph model for HAZOP analysis of chemical processes - Cui, Zhao, et al. - 2008 (Show Context)
1Computer-aided operability study. Comput - Shimada, Y, et al. - 1996 (Show Context)

10)
The Role of HazOp in Testing Health-Care Applications, Speaker Prof , Tor Stalhane, 5th CSVHC® , April 6 - 8, 2005 Congress Center Stadthalle Düsseldorf, Germany, 

References
[1] T. Stålhane, G.S. Sørvig: Risk Analysis as a Prioritizing Mechanism in SPI. Proc. EuroSPI 2003, December 10 – 12, Graz, Austria.
[2] A. Knudsen and K.M. Abrahamsen: Reuse of Experience in HazOp. Mas- ter Thesis, NTNU, 2004.
[3] J. Børretzen et al.: Safety activities during early software project phases. Submitted to NIK 2004, November 29 – December 1, 2004, Stavanger, Norway.
[4] T. Stålhane and K.J. Wedde: Safety Validation with Focus on Testing, 1st International Conference on Software Testing, April 5 – 7, 2000, Bonn, Germany
[5] G. Sindre and A.L. Opdahl: Eliciting Security Requirements by Misuse Cases, Proc. TOOLS Pacific 2000, November 20-23, 2000.
[6] L. Scott and T. Stålhane: Experience Repositories and the Postmortem. Workshop on Learning Software Organisations, Luzern, Switzerland, 2003.
[7] B.A. Gran: The CORAS methodology for model-based risk assessment. CORAS deliverable D2.4, August 29, 2003.
[8] P. Johannessen et al.: Hazard Analysis in Object Oriented design of De- pendable Systems, Proc. International Conference on Dependable Systems and Networks, July 1 – 4, Gøteborg, Sweden.

133Eliciting security requirements by misuse cases - Sindre, Opdahl - 2000 (Show Context)2The coras methodology for model-based risk assessment - Gran, Stathiakis, et al. - 2003 (Show Context)2el al, “Hazard Analysis in Object Oriented Design of Dependable Systems - Johannessen (Show Context)1Sørvig: Risk Analysis as a Prioritizing Mechanism - Stålhane, S (Show Context)1Reuse of Experience - Knudsen, Abrahamsen - 2004 (Show Context)1et al.: Safety activities during early software project phases - Børretzen (Show Context)1Safety Validation with Focus on Testing - Stålhane, Wedde (Show Context)
20:23 | 投票する | 投票数(0) | コメント(0)