<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Global Safety Management Method in Complex System Engineering</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Romaric</forename><surname>Guillerm</surname></persName>
							<email>guillerm@laas.fr</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">LAAS</orgName>
								<address>
									<addrLine>7 avenue du Colonel Roche</addrLine>
									<postCode>F-31400</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">Université de Toulouse</orgName>
								<orgName type="institution" key="instit2">UPS</orgName>
								<orgName type="institution" key="instit3">LAAS</orgName>
								<address>
									<postCode>F-31400</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hamid</forename><surname>Demmou</surname></persName>
							<email>demmou@laas.fr</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">LAAS</orgName>
								<address>
									<addrLine>7 avenue du Colonel Roche</addrLine>
									<postCode>F-31400</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">Université de Toulouse</orgName>
								<orgName type="institution" key="instit2">UPS</orgName>
								<orgName type="institution" key="instit3">LAAS</orgName>
								<address>
									<postCode>F-31400</postCode>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nabil</forename><surname>Sadou</surname></persName>
							<email>nabil.sadou@supelec.fr</email>
							<affiliation key="aff2">
								<orgName type="department">SUPELEC / IETR</orgName>
								<address>
									<addrLine>avenue de la Boulais</addrLine>
									<postCode>F-35511</postCode>
									<settlement>Cesson-Sevigne</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Global Safety Management Method in Complex System Engineering</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">666C3392178FF22807D0B49304B25296</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T22:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Safety requirement</term>
					<term>Requirement engineering</term>
					<term>Complex system</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In System Engineering, one of the most critical process is the requirement management, particularly when it deals with the safety requirements. These one are non-functional requirements and are related to emergent properties, which come from the integration of the different system components. They must be identified as soon as possible, because they are guards to validate or not the system, which can require changes in system architecture. Moreover, they are formulated at system level and need to be declined at sub-system level. The objective of this paper is to propose a global safety management method based on well-known safety methods, in order to organize the different tasks to make the system safe. The method focuses mainly on the definition of the system safety requirements following risk and hazard analysis, and also on their declination according to a top-down approach. It is based on the famous Failure Mode, Effects, and Criticality Analysis (FMECA) and the use of Fault Trees and Event Trees.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Modern systems are increasingly complex <ref type="bibr" target="#b0">[1]</ref>. Indeed, they integrate more and more different technologies, offer more functions, and have complex interactions between their components. The processes and the design methods must evolve to reflect this growing complexity <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b2">[3]</ref>. In particular, for our purposes, the management of properties such as reliability or security <ref type="bibr" target="#b3">[4]</ref> must evolve accordingly, to ensure and enable the necessary level of confidence <ref type="bibr" target="#b4">[5]</ref>. For an effective consideration of safety in the design process, it is necessary to consider safety in overall studies by the engineering system processes. The safety properties must be defined globally ; that is to say elicited <ref type="bibr" target="#b5">[6]</ref>. Once these safety properties are identified, they must be declined locally to be actually realized by the system. The local properties associated with subsystems must be satisfied to ensure the global properties, reaching issues of traceability <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b7">[8]</ref> and requirements engineering <ref type="bibr" target="#b8">[9]</ref>.</p><p>Requirements Engineering (RE) is one of the System Engineering (SE) processes. RE is a crucial process within the development of complex system. Safety requirements are classified as non-functional requirements and are related to emergent system properties. They cannot be attributed to a single system component. Furthermost, nonfunctional requirements are fundamental to determine the success of a system. Two activities are defined in RE. The first one concerns requirements development including the processes of elicitation, documentation, analysis and validation of requirements. The second one concerns requirement management which includes the processes of maintainability management, changes management and requirements traceability.</p><p>The work presented in this paper concerns a part of our approach for the integration of safety in system engineering processes <ref type="bibr" target="#b9">[10]</ref>. It is an improvement and extension of the method presented in <ref type="bibr" target="#b10">[11]</ref>, that was inspired from <ref type="bibr" target="#b11">[12]</ref> with a engineering process and requirements point of view. The approach allows taking into account the safety requirements in system engineering process to facilitate traceability of these requirements throughout the life cycle of the system. It concerns the two activities of RE: the development and the management activities. The paper presents a method that allows to define, derive and decline system safety requirements, with the combination of several FMECA (Failure Mode, Effects, and Criticality Analysis) <ref type="bibr" target="#b12">[13]</ref>, Fault Trees analysis <ref type="bibr" target="#b13">[14]</ref> and Event Trees analysis <ref type="bibr" target="#b14">[15]</ref>. This paper contains four parts. The second one presents the system engineering framework of the method. The third one exposes the method for safety requirement definition and declination, with its different steps. Finally, the last section concludes the paper and presents some perspectives.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Context</head><p>In this part, the context of our work is exposed. The first section presents the System Engineering notion. Then, the standard that we adopt is presented with its useful concept of building block that devises the design in different system layers. To finish, a focus is done on the safety requirement management.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">System Engineering</head><p>System Engineering (SE) is an interdisciplinary approach, whose objective is to assist the development of new systems. It contains collaborative and interdisciplinary processes of resolution of problems, supporting knowledge, methods and techniques resulting from the sciences and experiment to define a system, which satisfies an identified need, and is acceptable for the environment, while seeking to balance the total economy of the solution, on all the aspects of the problem in all the phases of the development and the life of the system. SE concepts are adequate specifically for complex problems <ref type="bibr" target="#b15">[16]</ref>.</p><p>SE is the application of scientific and engineering efforts to:</p><p>-Transform an operational need into a description of system performance parameters and a system configuration, through an iterative process of definition, synthesis, analysis, design, test and evaluation. -Integrate reliability, safety, maintainability, expandability, survivability, human engineering and other factors into the total engineering effort to meet cost, schedule, supportability and technical performance objectives.</p><p>SE is the global framework of the approach proposed in this paper.</p><p>Proceedings of the Posters Workshop at CSD&amp;M 2013</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">EIA-632 Standard</head><p>A standard currently used in the industrial and military fields is the EIA-632 standard <ref type="bibr" target="#b16">[17]</ref>. Our work is also based on it. Briefly, this standard covers the product life cycle from the needs capture to the transfer to the user. It is constituted by 13 processes grouped into 5 sets (see Figure <ref type="figure" target="#fig_0">1</ref>):</p><p>1. Technical management processes (three processes): these processes monitor the whole process ranging from the initial idea to building a system until the delivery of the system. 2. Acquisition and supply processes (two processes): these processes ensure the supply and acquisition (and are very close to logistics). 3. System design processes (two processes): these processes deal with the elicitation and the acquisition of requirements and their modelling, the definition of the logical design and its physical solution. 4. Product realization processes (two processes): these processes deal with the implementation is-sues of the system design and its use. 5. Technical evaluation processes (four processes): these processes deal with verification, validation and testing issues. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Building Block Concept</head><p>The EIA-632 standard adopts an original and interesting system decomposition based on the concept of "building block". A building block is the association between one (or several) final product and a set of enabling products, as shown in Figure <ref type="figure" target="#fig_1">2</ref>. In fact, the system is seen as a hierarchy of building blocks. The solutions defined in the upper layer (level) blocks, described by a set of specified requirements, are allocated as input requirements for the lower layer blocks (see figure <ref type="figure" target="#fig_2">3</ref>). Finally, the building block decomposition is stopped when blocks correspond to on-the-shelf components or when their realization can be subtracted. With this description, we identified the need of deriving the safety requirements through the hierarchical decomposition. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Safety Requirement Management</head><p>To clearly situate the position of the method for deriving safety requirements, the Figure <ref type="figure" target="#fig_3">4</ref> gives an overview of the involved EIA-632 system engineering processes.</p><p>Among the different possible sources of safety requirement we can find the requirement provided by some dependability analysis as shown in the Figure <ref type="figure" target="#fig_3">4</ref>. In this paper we consider this source of requirements. The proposed approach is used to define, derive and decline safety requirement with different safety analysis. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Global Safety Management Method</head><p>In this second part, the global safety management method is presented. First, an overview of the method is given, following by an explanation about the different kinds of safety requirements that are taken into account in the current version of the method. Afterwards, the 9 steps of the method are explained in details.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Overview</head><p>The method assumes that a complex system is composed of some subsystems (the principle of Building Block of the EIA-632 standard). It combines FMECA, fault trees and event trees, and has the objective to define all safety requirements at system level and to decline them locally at subsystems level with a goal of traceability. The Figure <ref type="figure" target="#fig_4">5</ref> summarizes the process associated to the method and illustrates how the different steps are integrated together.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Classification of the considered Safety Requirements</head><p>The method enables to identify and deals with several kinds of safety requirements. We have classify these requirements into subcategories, which are :</p><p>-Reliability requirement, that claims a quantitative objective in term of reliability properties. -Architectural requirement, that defines an architectural design to deal with safety (like redundancies). -Active functional security requirement, that is related to an additional security equipment (protective barrier) that can participate to reduce the probability of an accident. -Passive functional security requirement, that is related to an additional protective or mitigation equipment that can reduce the severity of an accident. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Step 1: Risks Identification</head><p>The first step is to identify and classify all the system risks. These can be human actions, external failures, internal failures (those of the system) or environmental conditions. The classification must be done in two groups: the risks representing internal failure modes and the other risks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Step 2: System Failure Modes Analysis</head><p>The second step is to begin the analysis of risks that correspond to system failure modes. The recommended method is the FMECA <ref type="bibr" target="#b12">[13]</ref>, that is a technique used to identify, prioritize, and eliminate potential failures from a system, a design or a process. Concretely, this step is to complete few columns of the FMECA table (others than severity, probability, criticality and corrective action) (see Table <ref type="table" target="#tab_0">1</ref>). For each system function, we identify failure modes, causes of these modes and effects on the system (possibly depending on the phase, state or mode). For the identification of failure modes, lists of generic modes have been defined in some standards like CEI 60812: 1985 <ref type="bibr" target="#b17">[18]</ref>. The effects are here the potential accidents.</p><p>In fact, we also propose some changes in the classical FMECA to clarify the method, visible in the Table <ref type="table" target="#tab_0">1</ref>. A distinction is made between the probability and the detectability of the failure modes and those of the effects. Indeed, between a failure mode and an effect (accident), there is a set of involved cofactors (protection barrier, environmental condition ...), recorded in the "condition" column of the table. These conditions will be identified during the step of consequences analysis.</p><p>The assessment of the probability of the risk and the assessment of the severity, probability and criticality of the effect will be done during the step of risk assessment. The corrective actions will be proposed at the risk mitigation step. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5">Step 3: Other Risks Analysis</head><p>This step is similar to the previous step of system failure modes analysis, but focuses on the other risks (external). The recommended method is to use the principle of an FMECA, that we can call here RECA (Risks, Effects, and Criticality Analysis) (see Table <ref type="table" target="#tab_1">2</ref>). This step is to complete few columns of the RECA table (others than severity, probability, criticality and corrective action). The effects are also the potential accidents. The same remarks as for the FMECA remain true concerning the probability, the detectability and the severity of the failure modes and the effects, and the conditions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6">Step 4: Consequences Analysis</head><p>In this step, the consequences of all the identified risks (system failure modes and others) must be analysed. This step is to identify how the risks contribute to an accident. It can be done using event trees <ref type="bibr" target="#b14">[15]</ref> to visualize the possible chains of events that led Proceedings of the Posters Workshop at CSD&amp;M 2013 from the risk to the accident, through branching points representing protective measures or interventions (cofactors) (see Figure <ref type="figure" target="#fig_5">6</ref>). The minimal cuts associated with the various accidents are also identified. A generic example is given in Figure <ref type="figure" target="#fig_5">6</ref>. The effects correspond to accidents, whereas the term consequences refers to events or factors involved in the causes to consequences relationship, starting from the analysed risk.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.7">Step 5: Causes Analysis</head><p>The fifth step is to conduct an internal analysis of the system by identifying the causes of system failure modes. These causes analysis must lead to subsystems failure modes. For this step, the use of fault trees <ref type="bibr" target="#b13">[14]</ref> is recommended. Indeed, a fault tree provides a simple modelling way to represent the interactions between components from the point of view of reliability. Static fault trees use traditional Boolean logic functions to represent the combination of component failures (events) that cause system failure.</p><p>So, the top event of each tree corresponds to a system cause. The objective is to determine the causes of the top event (using logical operators such as AND and OR) in the sub-systems. The leaves of the fault tree correspond to sub-systems failure modes (see Figure <ref type="figure" target="#fig_6">7</ref>).</p><p>In fact, the system failure modes analysed correspond either directly to a system risk (defined in the first step), or to a cofactor of an event tree which is a system failure mode.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.8">Step 6: Sub-systems Failure Modes Analysis</head><p>An analysis of the subsystems failure modes should be leaded in parallel, using FMECA. The subsystems failure modes used in step 5 re-appears (the principle of the FMECA analysis). This FMECA will define the corrective actions at the sub-systems level that are representative of subsystem reliability requirements. Assessment The risk assessment consists in defining the severity and the probability of the identified accidents, in order to evaluate the criticality. This information must be recorded in the various FMECA and the RECA tables. Concerning the probability, this one must be evaluated based on the fault trees and the event trees. Finally, it must be decided whether the risks are acceptable or not.</p><p>Mitigation The risk mitigation consists in advocating corrective actions (to be filled in the FMECA and the RECA) for the risks qualified as "non-acceptable" during the risk assessment step, in order to make them become "acceptable". The corrective actions can:</p><p>-Reduce the probability of the accident, by:</p><p>• Fixing an objective of reliability with a reliability requirement (at system or subsystem level). • Modifying the system architecture for a better reliability (with redundancies for example) with an architectural requirement, that derives from the reliability requirement of the objective. • Adding an additional security equipment (protective barrier) with a active functional security requirement, that derives from the reliability requirement of the objective. During the next iteration of the method, reliability requirements will be defined for this security equipment based on the analysis of the failure modes in which it participates. -Try to satisfy a criterion, for example:</p><p>• A single failure criterion, adding a security equipment (barrier) to increase the number of failures before the occurrence of an accident, with an active functional security requirement. • A spatial dispersion criterion, with an architectural requirement.</p><p>• A redundancy with separate development criterion, with an architectural requirement.</p><p>-Reduce the severity of the accident • Adding a protection or mitigation equipment, with an passive functional security requirement.</p><p>Note: This is not the only possible corrective actions (preventive maintenance for example). Other types of corrective actions will be incorporated in future work to improve the process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.10">Step 8: Safety Requirements Synthesis</head><p>Before eventually transferring the change requests to modify the system, this step will summarize the results in terms of requirements, declination of requirements, and traceability links between requirements and accidents, or requirements and requirements. As in the first version of the method <ref type="bibr" target="#b10">[11]</ref>, the declination part is based on the following 3 types of relations:</p><p>-System causes and system corrective actions, -System causes and sub-systems failure modes, -Sub-systems failures modes and sub-systems corrective actions.</p><p>A generic example of this synthesis is given in Figure <ref type="figure" target="#fig_7">8</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.11">Step 9: Stop Criterion</head><p>The process is finish once all the risks are considered as "acceptable". If this is not the case, a change request must order to modify the system and the method must be reapplied from the beginning by updating the different analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>The method provides a support framework to define system safety requirements with an objective of traceability and requirements declination and derivation. The interest is multiple for the safety field: the method deals with the safety elements (failure modes, safety requirements...) and it is done with a comprehensive system engineering (with traceability and requirements declination) which is a factor contributing to safer systems. This method is compatible with the standard EIA-632 <ref type="bibr" target="#b16">[17]</ref>, and it extends the principle and strengthens the links between failure modes researches and analysis (FMECA), causes analysis and effects analysis.</p><p>In this work, several safety attributes are taken into account, like reliability, passive security and active security. They correspond to the given classification of safety requirements, which are themselves defined from the corrective actions. Other requirements concerning maintainability or availability should also be considered in further study. The probability, the severity and the criticality was treated through the FMECA. However, the work still doesn't consider the detectability aspect. We also should update the tool that implements the first version of the method presented in <ref type="bibr" target="#b10">[11]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. EIA-632 Standard System Engineering Processes</figDesc><graphic coords="3,211.30,387.56,192.76,170.84" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. One Building Block</figDesc><graphic coords="4,194.29,136.82,226.78,96.26" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Multilayer building block</figDesc><graphic coords="4,208.46,380.99,198.43,143.61" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Dependability analysis as a source of requirements</figDesc><graphic coords="5,180.12,136.82,255.14,156.53" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Overview of the global safety management method</figDesc><graphic coords="6,137.59,136.81,340.19,182.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Event tree</figDesc><graphic coords="8,137.59,195.31,340.16,96.39" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Fault tree</figDesc><graphic coords="9,222.64,136.81,170.09,149.31" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Requirements traceability synthesis</figDesc><graphic coords="10,165.94,503.43,283.47,124.32" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>FMECA table</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>RECA table</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">Global Safety Management Method in Complex System Engineering</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_1">Proceedings of the Posters Workshop at CSD&amp;M 2013</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_2">Proceedings of the Posters at CSD&amp;M 2013</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">French roadmap for complex systems 2008-2009</title>
		<author>
			<persName><forename type="first">D</forename><surname>Chavalarias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bourgine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Perrier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Amblard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Arlabosse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Auger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Baillon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Barreteau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Baudot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bouchaud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">-de-France Complex Systems Institute (ISC-PIF) and IXXI</title>
				<meeting><address><addrLine>Paris Ile</addrLine></address></meeting>
		<imprint>
			<publisher>Entretiens de CargÃ ĺse</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>French National Network for Complex Systems (RNSC)</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Is the european industry moving toward solving requirements engineering problems?</title>
		<author>
			<persName><forename type="first">N</forename><surname>Juristo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Moreno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Silva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Software</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="70" to="77" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Great challenges and opportunities of distributed software development -an industrial survey</title>
		<author>
			<persName><forename type="first">S</forename><surname>Komi-Sirvio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tihinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifteenth International Conference on Software Engineering and Knowledge Engineering</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="489" to="496" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Basic concepts and taxonomy of dependable and secure computing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Avizienis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Laprie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Landwehr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Dependable and Secure Computing</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="11" to="33" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Risk management in a dynamic society: A modelling problem</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rasmussen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Safety Science, Elsevier Science Ltd</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="183" to="213" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Techniques for requirements elicitation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Goguen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Linde</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">1st IEEE International Symposium on Requirements Engineering</title>
				<meeting><address><addrLine>San Diego</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1993">1993</date>
			<biblScope unit="page" from="152" to="164" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An analysis of the requirements traceability problem</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">C Z</forename><surname>Gotel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">W</forename><surname>Finkelstein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ternational Conference on Requirements Engineering</title>
				<imprint>
			<date type="published" when="1994">1994</date>
			<biblScope unit="page" from="94" to="101" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Requirements traceability issues: Generic model, methodology and formal basis</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E K</forename><surname>Sahraoui</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Information Technology and Decision Making</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="59" to="80" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Software engineering (update)</title>
		<author>
			<persName><forename type="first">I</forename><surname>Sommerville</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>International Computer Science</publisher>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="11" to="33" />
			<pubPlace>Boston, MA, USA</pubPlace>
		</imprint>
	</monogr>
	<note>8th edition</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">System engineering approach for safety management of complex systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Guillerm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Demmou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sadou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of European Modeling and simulation (ESM)</title>
				<meeting>European Modeling and simulation (ESM)<address><addrLine>Leicester, United Kingdom</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Combining fmeca and fault trees for declining safety requirements of complex systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Guillerm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Demmou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sadou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Safety and Reliability Conference (ESREL)</title>
				<meeting><address><addrLine>Troyes (France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Derivation of safety requirements for an embedded control system</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Lindsay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Mcdermid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Engineering, Test and Evaluation Conference</title>
				<meeting><address><addrLine>Sydney</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="29" to="30" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Failure mode, effects and criticality analysis (fmeca) use in the federal aviation administration (faa) reusable launch vehicle (rlv) licensing process</title>
		<author>
			<persName><forename type="first">J</forename><surname>Buzzatto</surname></persName>
		</author>
		<idno>A.2-1 - 7</idno>
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">7</biblScope>
		</imprint>
	</monogr>
	<note>A.2-7</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Fault tree analysis, methods, and applications -a review</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">S</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Grosh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Tillman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Lie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Reliability</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="194" to="203" />
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Sûreté de fonctionnement des systèmes industriels</title>
		<author>
			<persName><forename type="first">A</forename><surname>Villemeur</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1988">1988</date>
			<publisher>Edition Eyrolles</publisher>
			<biblScope unit="page">785</biblScope>
			<pubPlace>Paris</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E K</forename><surname>Sahraoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Buede</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sage</surname></persName>
		</author>
		<title level="m">Issues in systems engineering research</title>
				<meeting><address><addrLine>Toulouse</addrLine></address></meeting>
		<imprint>
			<publisher>INCOSE congress</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Processes for engineering systems</title>
		<idno>EIA-632</idno>
	</analytic>
	<monogr>
		<title level="m">Electronic Industries Alliance standard</title>
				<imprint>
			<date type="published" when="1999-01-07">January 7 (1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<idno>CEI-60812</idno>
		<title level="m">Techniques d&apos;analyse de la fiabilité des systèmes</title>
				<imprint>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
