<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Global Safety Management Method in Complex System Engineering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Romaric Guillerm</string-name>
          <email>guillerm@laas.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hamid Demmou</string-name>
          <email>demmou@laas.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nabil Sadou</string-name>
          <email>nabil.sadou@supelec.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CNRS, LAAS</institution>
          ,
          <addr-line>7 avenue du Colonel Roche, F-31400, Toulouse</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SUPELEC / IETR</institution>
          ,
          <addr-line>avenue de la Boulais, F-35511, Cesson-Sevigne</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Université de Toulouse</institution>
          ,
          <addr-line>UPS, LAAS, F-31400, Toulouse</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <fpage>75</fpage>
      <lpage>86</lpage>
      <abstract>
        <p>In System Engineering, one of the most critical process is the requirement management, particularly when it deals with the safety requirements. These one are non-functional requirements and are related to emergent properties, which come from the integration of the different system components. They must be identified as soon as possible, because they are guards to validate or not the system, which can require changes in system architecture. Moreover, they are formulated at system level and need to be declined at sub-system level. The objective of this paper is to propose a global safety management method based on well-known safety methods, in order to organize the different tasks to make the system safe. The method focuses mainly on the definition of the system safety requirements following risk and hazard analysis, and also on their declination according to a top-down approach. It is based on the famous Failure Mode, Effects, and Criticality Analysis (FMECA) and the use of Fault Trees and Event Trees.</p>
      </abstract>
      <kwd-group>
        <kwd>Safety requirement</kwd>
        <kwd>Requirement engineering</kwd>
        <kwd>Complex system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Modern systems are increasingly complex [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Indeed, they integrate more and more
different technologies, offer more functions, and have complex interactions between
their components. The processes and the design methods must evolve to reflect this
growing complexity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In particular, for our purposes, the management of
properties such as reliability or security [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] must evolve accordingly, to ensure and enable
the necessary level of confidence [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. For an effective consideration of safety in the
design process, it is necessary to consider safety in overall studies by the engineering
system processes. The safety properties must be defined globally ; that is to say elicited
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Once these safety properties are identified, they must be declined locally to be
actually realized by the system. The local properties associated with subsystems must
be satisfied to ensure the global properties, reaching issues of traceability [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and
requirements engineering [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>Requirements Engineering (RE) is one of the System Engineering (SE) processes.
RE is a crucial process within the development of complex system. Safety
requirements are classified as non-functional requirements and are related to emergent system
properties. They cannot be attributed to a single system component. Furthermost,
nonfunctional requirements are fundamental to determine the success of a system. Two
activities are defined in RE. The first one concerns requirements development including
the processes of elicitation, documentation, analysis and validation of requirements.
The second one concerns requirement management which includes the processes of
maintainability management, changes management and requirements traceability.</p>
      <p>
        The work presented in this paper concerns a part of our approach for the integration
of safety in system engineering processes [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. It is an improvement and extension of
the method presented in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], that was inspired from [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] with a engineering process
and requirements point of view. The approach allows taking into account the safety
requirements in system engineering process to facilitate traceability of these
requirements throughout the life cycle of the system. It concerns the two activities of RE: the
development and the management activities. The paper presents a method that allows to
define, derive and decline system safety requirements, with the combination of several
FMECA (Failure Mode, Effects, and Criticality Analysis) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], Fault Trees analysis [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
and Event Trees analysis [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. This paper contains four parts. The second one presents
the system engineering framework of the method. The third one exposes the method for
safety requirement definition and declination, with its different steps. Finally, the last
section concludes the paper and presents some perspectives.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Context</title>
      <p>In this part, the context of our work is exposed. The first section presents the System
Engineering notion. Then, the standard that we adopt is presented with its useful
concept of building block that devises the design in different system layers. To finish, a
focus is done on the safety requirement management.
2.1</p>
      <sec id="sec-2-1">
        <title>System Engineering</title>
        <p>
          System Engineering (SE) is an interdisciplinary approach, whose objective is to
assist the development of new systems. It contains collaborative and interdisciplinary
processes of resolution of problems, supporting knowledge, methods and techniques
resulting from the sciences and experiment to define a system, which satisfies an
identified need, and is acceptable for the environment, while seeking to balance the total
economy of the solution, on all the aspects of the problem in all the phases of the
development and the life of the system. SE concepts are adequate specifically for complex
problems [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>SE is the application of scientific and engineering efforts to:
– Transform an operational need into a description of system performance parameters
and a system configuration, through an iterative process of definition, synthesis,
analysis, design, test and evaluation.
– Integrate reliability, safety, maintainability, expandability, survivability, human
engineering and other factors into the total engineering effort to meet cost, schedule,
supportability and technical performance objectives.</p>
        <sec id="sec-2-1-1">
          <title>SE is the global framework of the approach proposed in this paper. Proceedings of the Posters Workshop at CSD&amp;M 2013 76</title>
          <p>2.2</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>EIA-632 Standard</title>
        <p>
          A standard currently used in the industrial and military fields is the EIA-632 standard
[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Our work is also based on it.
        </p>
        <p>Briefly, this standard covers the product life cycle from the needs capture to the
transfer to the user. It is constituted by 13 processes grouped into 5 sets (see Figure 1):
1. Technical management processes (three processes): these processes monitor the
whole process ranging from the initial idea to building a system until the delivery
of the system.
2. Acquisition and supply processes (two processes): these processes ensure the
supply and acquisition (and are very close to logistics).
3. System design processes (two processes): these processes deal with the elicitation
and the acquisition of requirements and their modelling, the definition of the logical
design and its physical solution.
4. Product realization processes (two processes): these processes deal with the
implementation is-sues of the system design and its use.
5. Technical evaluation processes (four processes): these processes deal with
verification, validation and testing issues.
The EIA-632 standard adopts an original and interesting system decomposition based
on the concept of "building block". A building block is the association between one (or
several) final product and a set of enabling products, as shown in Figure 2.</p>
        <p>In fact, the system is seen as a hierarchy of building blocks. The solutions defined in
the upper layer (level) blocks, described by a set of specified requirements, are allocated
as input requirements for the lower layer blocks (see figure 3). Finally, the building
block decomposition is stopped when blocks correspond to on-the-shelf components or
when their realization can be subtracted. With this description, we identified the need
of deriving the safety requirements through the hierarchical decomposition.
To clearly situate the position of the method for deriving safety requirements, the Figure
4 gives an overview of the involved EIA-632 system engineering processes.</p>
        <p>Among the different possible sources of safety requirement we can find the
requirement provided by some dependability analysis as shown in the Figure 4. In this paper we
consider this source of requirements. The proposed approach is used to define, derive
and decline safety requirement with different safety analysis.
In this second part, the global safety management method is presented. First, an overview
of the method is given, following by an explanation about the different kinds of safety
requirements that are taken into account in the current version of the method.
Afterwards, the 9 steps of the method are explained in details.
The method assumes that a complex system is composed of some subsystems (the
principle of Building Block of the EIA-632 standard). It combines FMECA, fault trees and
event trees, and has the objective to define all safety requirements at system level and
to decline them locally at subsystems level with a goal of traceability. The Figure 5
summarizes the process associated to the method and illustrates how the different steps
are integrated together.
The method enables to identify and deals with several kinds of safety requirements. We
have classify these requirements into subcategories, which are :
– Reliability requirement, that claims a quantitative objective in term of reliability
properties.
– Architectural requirement, that defines an architectural design to deal with safety
(like redundancies).
– Active functional security requirement, that is related to an additional security
equipment (protective barrier) that can participate to reduce the probability of an
accident.
– Passive functional security requirement, that is related to an additional protective
or mitigation equipment that can reduce the severity of an accident.
The first step is to identify and classify all the system risks. These can be human actions,
external failures, internal failures (those of the system) or environmental conditions.
The classification must be done in two groups: the risks representing internal failure
modes and the other risks.
3.4</p>
      </sec>
      <sec id="sec-2-3">
        <title>Step 2: System Failure Modes Analysis</title>
        <p>
          The second step is to begin the analysis of risks that correspond to system failure modes.
The recommended method is the FMECA [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], that is a technique used to identify,
prioritize, and eliminate potential failures from a system, a design or a process. Concretely,
this step is to complete few columns of the FMECA table (others than severity,
probability, criticality and corrective action) (see Table 1). For each system function, we
identify failure modes, causes of these modes and effects on the system (possibly
depending on the phase, state or mode). For the identification of failure modes, lists of
generic modes have been defined in some standards like CEI 60812: 1985 [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. The
effects are here the potential accidents.
        </p>
        <p>In fact, we also propose some changes in the classical FMECA to clarify the method,
visible in the Table 1. A distinction is made between the probability and the detectability
of the failure modes and those of the effects. Indeed, between a failure mode and an
effect (accident), there is a set of involved cofactors (protection barrier, environmental
condition ...), recorded in the "condition" column of the table. These conditions will be
identified during the step of consequences analysis.</p>
        <p>The assessment of the probability of the risk and the assessment of the severity,
probability and criticality of the effect will be done during the step of risk assessment.
The corrective actions will be proposed at the risk mitigation step.
This step is similar to the previous step of system failure modes analysis, but focuses
on the other risks (external). The recommended method is to use the principle of an
FMECA, that we can call here RECA (Risks, Effects, and Criticality Analysis) (see
Table 2). This step is to complete few columns of the RECA table (others than severity,
probability, criticality and corrective action). The effects are also the potential accidents.</p>
        <p>The same remarks as for the FMECA remain true concerning the probability, the
detectability and the severity of the failure modes and the effects, and the conditions.
3.6</p>
      </sec>
      <sec id="sec-2-4">
        <title>Step 4: Consequences Analysis</title>
        <p>
          In this step, the consequences of all the identified risks (system failure modes and
others) must be analysed. This step is to identify how the risks contribute to an accident.
It can be done using event trees [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] to visualize the possible chains of events that led
from the risk to the accident, through branching points representing protective measures
or interventions (cofactors) (see Figure 6). The minimal cuts associated with the various
accidents are also identified.
        </p>
        <p>A generic example is given in Figure 6. The effects correspond to accidents, whereas
the term consequences refers to events or factors involved in the causes to consequences
relationship, starting from the analysed risk.
3.7</p>
      </sec>
      <sec id="sec-2-5">
        <title>Step 5: Causes Analysis</title>
        <p>
          The fifth step is to conduct an internal analysis of the system by identifying the causes
of system failure modes. These causes analysis must lead to subsystems failure modes.
For this step, the use of fault trees [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] is recommended. Indeed, a fault tree provides
a simple modelling way to represent the interactions between components from the
point of view of reliability. Static fault trees use traditional Boolean logic functions to
represent the combination of component failures (events) that cause system failure.
        </p>
        <p>So, the top event of each tree corresponds to a system cause. The objective is to
determine the causes of the top event (using logical operators such as AND and OR) in
the sub-systems. The leaves of the fault tree correspond to sub-systems failure modes
(see Figure 7).</p>
        <p>In fact, the system failure modes analysed correspond either directly to a system
risk (defined in the first step), or to a cofactor of an event tree which is a system failure
mode.
3.8</p>
      </sec>
      <sec id="sec-2-6">
        <title>Step 6: Sub-systems Failure Modes Analysis</title>
        <p>An analysis of the subsystems failure modes should be leaded in parallel, using FMECA.
The subsystems failure modes used in step 5 re-appears (the principle of the FMECA
analysis). This FMECA will define the corrective actions at the sub-systems level that
are representative of subsystem reliability requirements.
The seventh step is the central one. It deals with risks assessment and risks mitigation
with definitions of corrective actions.</p>
        <p>Assessment The risk assessment consists in defining the severity and the probability
of the identified accidents, in order to evaluate the criticality. This information must be
recorded in the various FMECA and the RECA tables. Concerning the probability, this
one must be evaluated based on the fault trees and the event trees. Finally, it must be
decided whether the risks are acceptable or not.</p>
        <p>Mitigation The risk mitigation consists in advocating corrective actions (to be filled in
the FMECA and the RECA) for the risks qualified as "non-acceptable" during the risk
assessment step, in order to make them become "acceptable". The corrective actions
can:
– Reduce the probability of the accident, by:
• Fixing an objective of reliability with a reliability requirement (at system or
subsystem level).
• Modifying the system architecture for a better reliability (with redundancies
for example) with an architectural requirement, that derives from the reliability
requirement of the objective.
• Adding an additional security equipment (protective barrier) with a active
functional security requirement, that derives from the reliability requirement of
the objective. During the next iteration of the method, reliability requirements
will be defined for this security equipment based on the analysis of the failure
modes in which it participates.</p>
        <p>– Try to satisfy a criterion, for example:
• A single failure criterion, adding a security equipment (barrier) to increase
the number of failures before the occurrence of an accident, with an active
functional security requirement.
• A spatial dispersion criterion, with an architectural requirement.
• A redundancy with separate development criterion, with an architectural
requirement.
– Reduce the severity of the accident
• Adding a protection or mitigation equipment, with an passive functional
security requirement.</p>
        <p>Note: This is not the only possible corrective actions (preventive maintenance for
example). Other types of corrective actions will be incorporated in future work to
improve the process.
3.10</p>
      </sec>
      <sec id="sec-2-7">
        <title>Step 8: Safety Requirements Synthesis</title>
        <p>
          Before eventually transferring the change requests to modify the system, this step will
summarize the results in terms of requirements, declination of requirements, and
traceability links between requirements and accidents, or requirements and requirements. As
in the first version of the method [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], the declination part is based on the following 3
types of relations:
– System causes and system corrective actions,
– System causes and sub-systems failure modes,
– Sub-systems failures modes and sub-systems corrective actions.
        </p>
        <sec id="sec-2-7-1">
          <title>A generic example of this synthesis is given in Figure 8.</title>
          <p>3.11</p>
        </sec>
      </sec>
      <sec id="sec-2-8">
        <title>Step 9: Stop Criterion</title>
        <p>The process is finish once all the risks are considered as "acceptable". If this is not
the case, a change request must order to modify the system and the method must be
reapplied from the beginning by updating the different analysis.
4</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>
        The method provides a support framework to define system safety requirements with
an objective of traceability and requirements declination and derivation. The
interest is multiple for the safety field: the method deals with the safety elements (failure
modes, safety requirements...) and it is done with a comprehensive system engineering
(with traceability and requirements declination) which is a factor contributing to safer
systems. This method is compatible with the standard EIA-632 [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], and it extends
the principle and strengthens the links between failure modes researches and analysis
(FMECA), causes analysis and effects analysis.
      </p>
      <p>
        In this work, several safety attributes are taken into account, like reliability,
passive security and active security. They correspond to the given classification of safety
requirements, which are themselves defined from the corrective actions. Other
requirements concerning maintainability or availability should also be considered in further
study. The probability, the severity and the criticality was treated through the FMECA.
However, the work still doesn’t consider the detectability aspect. We also should update
the tool that implements the first version of the method presented in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Chavalarias</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bourgine</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perrier</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amblard</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arlabosse</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Auger</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baillon</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barreteau</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baudot</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bouchaud</surname>
          </string-name>
          , E.:
          <article-title>French roadmap for complex systems 2008-2009</article-title>
          .
          <article-title>French National Network for Complex Systems</article-title>
          (RNSC), Paris Ile-de-France
          <string-name>
            <surname>Complex Systems Institute (ISC-PIF) and</surname>
            <given-names>IXXI</given-names>
          </string-name>
          , Entretiens de CargÃ´lse (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Juristo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moreno</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Is the european industry moving toward solving requirements engineering problems? IEEE Software 19 (</article-title>
          <year>2002</year>
          )
          <fpage>70</fpage>
          -
          <lpage>77</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Komi-Sirvio</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tihinen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Great challenges and opportunities of distributed software development - an industrial survey</article-title>
          .
          <source>Fifteenth International Conference on Software Engineering and Knowledge Engineering</source>
          (
          <year>2003</year>
          )
          <fpage>489</fpage>
          -
          <lpage>496</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Avizienis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laprie</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Randell</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Landwehr</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Basic concepts and taxonomy of dependable and secure computing</article-title>
          .
          <source>IEEE Transactions on Dependable and Secure Computing</source>
          <volume>1</volume>
          (
          <year>2004</year>
          )
          <fpage>11</fpage>
          -
          <lpage>33</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Rasmussen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Risk management in a dynamic society: A modelling problem</article-title>
          .
          <source>Safety Science, Elsevier Science Ltd</source>
          .
          <volume>27</volume>
          (
          <year>1997</year>
          )
          <fpage>183</fpage>
          -
          <lpage>213</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Goguen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linde</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Techniques for requirements elicitation</article-title>
          .
          <source>1st IEEE International Symposium on Requirements Engineering</source>
          , San Diego (
          <year>1993</year>
          )
          <fpage>152</fpage>
          -
          <lpage>164</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gotel</surname>
            ,
            <given-names>O.C.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finkelstein</surname>
            ,
            <given-names>C.W.:</given-names>
          </string-name>
          <article-title>An analysis of the requirements traceability problem</article-title>
          .
          <source>International Conference on Requirements Engineering</source>
          (
          <year>1994</year>
          )
          <fpage>94</fpage>
          -
          <lpage>101</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Sahraoui</surname>
            ,
            <given-names>A.E.K.</given-names>
          </string-name>
          :
          <article-title>Requirements traceability issues: Generic model, methodology and formal basis</article-title>
          .
          <source>International Journal of Information Technology and Decision Making</source>
          <volume>4</volume>
          (
          <issue>1</issue>
          ) (
          <year>2005</year>
          )
          <fpage>59</fpage>
          -
          <lpage>80</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sommerville</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Software engineering (update) (8th edition)</article-title>
          .
          <source>International Computer Science</source>
          , Boston, MA, USA
          <volume>1</volume>
          (
          <year>2006</year>
          )
          <fpage>11</fpage>
          -
          <lpage>33</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Guillerm</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demmou</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadou</surname>
          </string-name>
          , N.:
          <article-title>System engineering approach for safety management of complex systems</article-title>
          .
          <source>Proceedings of European Modeling and simulation (ESM)</source>
          , Leicester, United
          <string-name>
            <surname>Kingdom</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Guillerm</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demmou</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadou</surname>
          </string-name>
          , N.:
          <article-title>Combining fmeca and fault trees for declining safety requirements of complex systems</article-title>
          .
          <source>European Safety and Reliability Conference (ESREL)</source>
          ,
          <source>Troyes (France)</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lindsay</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McDermid</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          :
          <article-title>Derivation of safety requirements for an embedded control system</article-title>
          .
          <source>Engineering</source>
          , Test and Evaluation Conference, Sydney (
          <year>2002</year>
          )
          <fpage>29</fpage>
          -
          <lpage>30</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Buzzatto</surname>
          </string-name>
          , J.:
          <article-title>Failure mode, effects and criticality analysis (fmeca) use in the federal aviation administration (faa) reusable launch vehicle (rlv) licensing process</article-title>
          .
          <volume>2</volume>
          (
          <issue>1999</issue>
          )
          <article-title>7</article-title>
          .
          <source>A.2-1 - 7.A.2-7</source>
          vol.2
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>W.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosh</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tillman</surname>
            ,
            <given-names>F.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lie</surname>
            ,
            <given-names>C.H.</given-names>
          </string-name>
          :
          <article-title>Fault tree analysis, methods, and applications - a review</article-title>
          .
          <source>IEEE Transactions on Reliability</source>
          <volume>1</volume>
          (
          <year>1985</year>
          )
          <fpage>194</fpage>
          -
          <lpage>203</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Villemeur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Sûreté de fonctionnement des systèmes industriels</article-title>
          . Paris : Edition Eyrolles (
          <year>1988</year>
          )
          <fpage>785</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Sahraoui</surname>
            ,
            <given-names>A.E.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buede</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sage</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Issues in systems engineering research</article-title>
          .
          <source>INCOSE congress</source>
          , Toulouse (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. EIA-
          <volume>632</volume>
          :
          <article-title>Processes for engineering systems</article-title>
          .
          <source>Electronic Industries Alliance standard, January</source>
          <volume>7</volume>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. CEI-
          <volume>60812</volume>
          :
          <article-title>Techniques d'analyse de la fiabilité des systèmes</article-title>
          . (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>