Title: Software safety: relating software assurance and software integrity

Authors: Ibrahim Habli, Richard Hawkins, Tim Kelly

Addresses: High Integrity Systems Engineering Research Group, Department of Computer Science, The University of York, York, YO10 5DD, UK. ' High Integrity Systems Engineering Research Group, Department of Computer Science, The University of York, York, YO10 5DD, UK. ' High Integrity Systems Engineering Research Group, Department of Computer Science, The University of York, York, YO10 5DD, UK

Abstract: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, for software, it is widely accepted that there is a limit on what can be quantitatively demonstrated, e.g., by means of statistical testing and operational experience. To address this limitation, many software standards appeal instead to the quality of the process to assure the sufficient implementation of the software. In this paper, we contend that there is a large inductive gap between the quantitative software integrity required for a safety function and the assurance of the software development process for that function. We propose that this large inductive gap between software integrity and software process assurance could be narrowed down by an explicit definition of a product-based software argument. The role of this argument is to justify the transition from arguing about software integrity to arguing about software assurance by showing how the evidence, in the context of the software product-based argument, provides assurance which is commensurate with the required integrity.

Keywords: software safety; software reliability; safety critical systems; safety critical software; software safety standards; software assurance; software integrity; software quantification; safety cases; safety arguments; goal structuring notation.

DOI: 10.1504/IJCCBS.2010.036605

International Journal of Critical Computer-Based Systems, 2010 Vol.1 No.4, pp.364 - 383

Published online: 04 Nov 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article