<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Assurance Case Driven Design based on the Harmonized Framework of Safety and Security Requirements</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladimir Sklyar</string-name>
          <email>v.sklyar@csn.khai.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vyacheslav Kharchenko</string-name>
          <email>v.kharchenko@csn.khai.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aerospace University “KhAI”</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Assurance (Security and Safety) Case is an approach to prove critical systems and software compliance with security and safety requirements. We propose an advanced framework named as Assurance Case Driven Design (AC DD) to improve cost-effectiveness of certification and licensing processes. AC DD is based on Claim-Argument-Evidence-Criteria (CAEC) notation and Development-Verification&amp;Validation-Assurance Case (DVA) notation. An example of AC DD application for Functional Safety Management part of requirements of the standard IEC 61508 is considered.</p>
      </abstract>
      <kwd-group>
        <kwd>certification</kwd>
        <kwd>assurance case</kwd>
        <kwd>safety and security life cycle</kwd>
        <kwd>IEC 61508</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Assurance (Security and Safety) Case implementation goals are, firstly, proving a
conformance of security and safety critical systems and software with requirements,
and, secondly, discovering a gap in these requirements conformance [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Assurance
Case Driven Design (AC DD) is proposed to apply Assurance Case building as soon
as possible for the earliest stages of life cycle activities. The main goal of this
approach is to improve cost-effectiveness of certification and licensing processes [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
AC DC also supports the following important topics:
 Research of integral security and safety features of modern critical control and
communication systems and networks as an integral property; security importance
increasing requests implementation of security requirements as a part of licensing
issues; such approach is named as Security Informed Safety Case [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]; such
approach is targeted to analyze safety and security in a structured way and creating
Security Informed Safety Case that provide justification of safety taking into
particular consideration the impact of security [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ];
 Research of different type of embedded components, such as Field Programmable
      </p>
      <p>Gates Arrays (FPGAs) and microprocessor units (MCUs);
 Research applications for specific market, for example, cloud computing, big data
analytics and IoT with high level requirements to safety, security and quality of
service (QoS).</p>
      <p>
        At the present Assurance Case methodology progress lays in multidisciplinary
dissemination of theory and experience [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Experts form different area may develop a
general and cross-platform security and safety assurance approaches. At the same
time there are some potential areas for Assurance Case improvement, such as:
 Assurance Case should faster find gaps in compliance with requirements than
demonstrate such compliance;
 It is reasonable to implement Assurance Case from the earliest stage of life cycle;
one more reason to do it is a prospective idea to combine of Assurance Case with
argument based design approach, what is a basis for elimination a board between
design and modeling;
 Assurance Case should provide as many details as it is needed for comprehensive
analysis;
 Assurance Case should support re-using of system safety and security files during
system operation and maintenance;
 Assurance Case should support cost effectiveness of system life cycle;
 It is reasonable to improve formalism of Assurance Case against empirics in
descriptions.
      </p>
      <p>Assurance Case has two sides of description and implementation:
1. A static part which describes an approach to combine arguments for assurance
support;
2. A dynamic part to support a static part movement between stages of analyzed
system life cycle.</p>
      <p>
        The modern researches in the Assurance Case area are mostly oriented to industry,
such as new coming applications covering [
        <xref ref-type="bibr" rid="ref6 ref7">6,7</xref>
        ], patterns development [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and
computer tools improvement [
        <xref ref-type="bibr" rid="ref10 ref9">9,10</xref>
        ]. At the same time, theoretical researches can improve
Assurance Case usability for different industries [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        CAE and GSN formalisms are based on classical set theory, graph theory and
relation algebra. Such relations tracing allows us to propose extensions for existing
notations. In this article we discuss an approach to develop
Claim-Argument-EvidenceCriteria (CAEC) notation as an extension of CAE notation [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>The second side of Assurance Case implementation is dynamic application via life
cycle stages. We propose Development – Verification &amp; Validation –Assurance Case
(DVA) notation for description of dynamic Assurance Case application.</p>
      <p>
        We choose the standard IEC 61508 “Functional safety of
electrical/electronic/programmable electronic safety-related systems” and applied it for
Industrial Control System (ICS). It allows implementing a pilot application of AC DD
for Functional Safety Management part of the IEC 61508 requirements [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ].
      </p>
      <p>
        This paper continue series of researches in Assurance Case domain [
        <xref ref-type="bibr" rid="ref14 ref4">4,14</xref>
        ]. A
novelty of this paper consists in application of previously developed AC DD approach to
ICS safety and security assurance and assessment.
      </p>
      <sec id="sec-1-1">
        <title>2.1 General Framework for Assurance Case Driven Design</title>
        <p>
          A general AC DD framework is described in details in [
          <xref ref-type="bibr" rid="ref14 ref4">4,14</xref>
          ]. Usually the first step in
any system development is signing a contract. This contract is an input for system
functional requirement as well as certification or licensing framework for safety and
security critical applications. The Requirement Specification has to be developed on
the base of contractual functional requirements.
        </p>
        <p>Safety and security critical systems shall have an important addition to the
Requirement Specification describing not functional requirements targeted to implement
system integrity. AC DD approach proposes to present such requirements in a view of
a preliminary Assurance Case. Such preliminary Assurance Case is not a result of
assessment but a target which has to be achieved after the system implementation.
Not functional requirements of Assurance Case are an input for Safety or Security
Management Plan which has cover life cycle description with all development support
processes. Some parts of not functional requirements (for example, self-diagnostic
requirements) may affect the Requirement Specification. After that staged life cycle
with V&amp;V and other supporting processes activities (Project Management,
Configuration Management and other) has to be implemented in accordance with Safety
(Security) Management Plan. After the contract and the Requirement Specification stages
life cycle usually includes design, implementation, integration, validation, installation,
and commissioning stages. Assurance Case activities have to be implemented after
each of the stage. Safety or security certification has to finalize system life cycle
before transfer it in operation at the customer site. Also during operation a periodical
assessment or certification has to be done with associated update of Assurance Case.</p>
        <p>Assurance Case structure depends from a type of the application. For example a
typical structure of Assurance Case for industrial functional safety related application
includes: security activities coordinated with safety, process implementation and
assessment, and product implementation and assessment. Assessment can be done in a
view of deterministic analysis, probabilistic analysis or demonstration.</p>
      </sec>
      <sec id="sec-1-2">
        <title>2.2 Claim-Argument-Evidence-Criteria (CAEC) Notation</title>
        <p>
          There are two the main notation used for Assurance Case [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]:
Claim-ArgumentEvidence (CAE) and Goal Structured Notation (GSN).
        </p>
        <p>
          Usually both CAE and GSN are presented in a graphical view. Also an approach to
represent the CAE in a table view is widely used in industry [
          <xref ref-type="bibr" rid="ref5 ref6">5,6</xref>
          ]. If we discuss about
formal background of Assurance Case notations, all of them can be described with set
theory and graph theory apparatus.
        </p>
        <p>Another side of theoretical approach is structured development of Assurance Case.
A typical multi levels required by regulations include the following: Level 0 (L0) –
conceptual level; Level 1 (L1) – design level; Level 2 (L2) – implementation level.</p>
        <p>In the AC DD framework we propose some addition for Assurance Case CAE
notations to be able assess specific features of critical systems. Acceptance criteria and
coverage criteria are two additional entities which have to be taken into account for
support arguments and evidences. Acceptance criteria are the conditions when stated
requirements are met. From the point view of Assurance Case, acceptance criteria
provide us ability to state the right arguments which are consistent with the claim and
to provide the evidences which are consistent with the arguments. Coverage criteria
describe how completely the claim is met.</p>
        <p>From the point view of Assurance Case, coverage criteria provide us ability to state
multiple arguments to completely cover all claim features and to provide multiple
evidences which completely cover the arguments. Acceptance criteria for a claim can
be extracted from both argument and/or evidence. In general case acceptance criteria
provide a quantitative and qualitative description of a situation when the claim is met.
A coverage criterion is a measure used to describe the degree to which evidence for
specific arguments is provided. A modified CAE notation which we name
ClaimArgument-Evidence-Criteria (CAEC) notation is given on Fig. 1.</p>
        <p>acceptance</p>
        <p>criteria
argument
coverage criteria
claim
evidence</p>
        <p>The next step of CAE / CAEC notation development is to support activities of
Safety &amp; Security Life Cycle (SSLC) stages with implementation of Assurance Case.
Specification and design requirements are the inputs for each of the SSLC stage. After
any stage fulfillment, requirements implementation assessment has to be performed.</p>
      </sec>
      <sec id="sec-1-3">
        <title>2.3 Development-V&amp;V-Assurance Case (DVA) Notation</title>
        <p>The following activities are mandatory for each of the SSLC stage (see Fig. 2):
 Development targeted to move an implemented product representation stage by
stage through SSLC;
 V&amp;V targeted to check conformance of the SSLC stage development outputs to the</p>
        <p>SLC stage development inputs;
 Assurance Case update based on assessment of performed development and V&amp;V
activities.</p>
        <p>The proposed DVA Development-V&amp;V-Assurance Case (DVA) notation is based
on following fundamentals:</p>
        <sec id="sec-1-3-1">
          <title>Development</title>
        </sec>
        <sec id="sec-1-3-2">
          <title>Assurance</title>
          <p>VerificationCase</p>
          <p>&amp;</p>
          <p>Validation
 Safety &amp; Security Life Cycle can be represented in a view of three components:</p>
          <p>Development (D), Verification and Validation (V&amp;V) and Assurance Case (A);
 Development activities are staged implementation of requirements in design
description of system, hardware and software, and after that implementation of
requirements in a physical system, hardware and software;
 Development also covers processes implementation to support development of the
product; processes also are described in a view of requirements which are collected
in project plans;
 Typically requirements are represented and handled as database records; from this
point of view the main operation with requirements are CREATE (to add),
DELETE, MODIFY (if requirement needs some sense correction), EDIT (if
requirement needs only editorial correction without changing of a sense);
 Forward and backward requirement tracing shall be implemented at each of Life
Cycle stage to assure: 1) all previous stage requirements are implemented into the
next stage documents; 2) no new requirement appears in the next stage documents;
3) all the requirements are verified or validated;
 Compliance of the product of next Life Cycle stage with the product of the
previous Life Cycle stage is checked by implementation of V&amp;V process;
 Compliance of processes implementation (including development and V&amp;V
processes) is checked by audits when processes implementation evidences are
investigated against the project plans requirements; these audits can be a part of
Assurance Case activities;
 All three D, V and A components of Safety &amp; Security Life Cycle have specific
inputs and outputs for each of the Life Cycle stage; so a diagram on Fig. 3
represents DVA relations for some single stage.</p>
          <p>To develop a graph and theoretical-set based model for DVA notation a diagram
on Fig. 2 should be elaborated to reflect feedback relations after V&amp;V and Assurance
Case performance (see Fig. 3). Direct data transmission and feedback data are
highlighted with different templates of lines.</p>
          <p>DI</p>
          <p>AI(V)</p>
          <p>AI(D)</p>
          <p>AO</p>
          <p>It is clear for Fig. 3, that input and output sets have some overlapping, so sets of
DVA data flows ate described in terms of inputs. There are the following data sets
transmitted between components of DVA:
 DI = {di1, di2, …, diK} – a set of development process inputs transmitted from the
out of the previous life cycle stage;
 VI(D) = {vid1, vid2, …, vidL} – a set of V&amp;V process inputs transmitted from the out
of development process;
 AI(D) = {aid1, aid2, …, aidM} – a set of Assurance Case process inputs transmitted
from the out of development process;
 AI(V) = {aiv1, aiv2, …, aivN} – a set of Assurance Case process inputs transmitted
from the out of V&amp;V process;
 DI(V) = {div1, div2, …, divP} – a set of development process inputs transmitted from
the out of V&amp;V process (a corrective feedback);
 DI(A) = {dia1, dia2, …, diaQ} – a set of development process inputs transmitted from
the out of Assurance Case process (a corrective feedback);
 VI(A) = {via1, via2, …, viaR} – a set of V&amp;V process inputs transmitted from the out
of Assurance Case process (a corrective feedback);
 AO = {ao1, ao2, …, aoS} – a set of Assurance Case process inputs transmitted to the
next life cycle stage after all the internal corrections.</p>
          <p>
            The following software tools are available to develop Assurance Case [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]:
 ASCE (Assurance and Safety Case Environment) developed by British company
          </p>
          <p>Adelard supports both CAE and GSN;
 Astah GSN developed by Japanese company Change Vision supports only GSN;
 NOR-STA developed by Polish company Argevide supports GSN and specific
listoriented TRUST-IT notation.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3 Framework of Safety and Security Requirements</title>
      <p>
        Result of industrial standards considering [
        <xref ref-type="bibr" rid="ref12 ref15">12,15</xref>
        ] allows representing existing
security requirements to Industrial Control Systems (ICS) related with a restricted set of
categories (see Fig. 4).
      </p>
      <p>This conceptual security requirements taxonomy include four the main parts:
 Risk management and assessment as a corner stone for definition of acceptable
risks levels and countermeasures for risks reduction;
 Categories of security features implementation which include triad “People –
Process – Technologies”;
 ICS context which drive to define requirement taking into account specifics of ICS;
this concept includes three types of models (reference, physical architecture and
zone models) as well as functionality, components, assets and other definitions,
and security and safety coordination issues;
 ICS security levels concept which grades risk levels for ICS separated parts and
establishes different life cycle processes and countermeasures for different security
levels.</p>
      <p>
        A risk management process should be employed throughout an organization, using
a three-tiered approach to address risk at the organization level; mission/business
process level; and information system level (IT system and ICS). After that the
principle of the “People – Process – Technologies” categories triad shall be implemented
as the core of Information Security Management System (ISMS) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>A context of the ICS can be represented by combination of three models, which are
Reference Model, Physical Architecture Model, and Zone Model (see Fig. 5).</p>
      <p>
        Zone Model provides the context for assessing common threats, vulnerabilities,
and the corresponding countermeasures needed to attain the level of security required
to protect the grouped assets. After grouping assets in this manner, a security policy is
defined for all assets that are members of the zone. The results of this analysis are
used to determine the appropriate protection required based on the activities
performed in the zone [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>Every situation has a different acceptable level of security. For large or complex
systems, it may not be practical or necessary to apply the same level of security to all
components. Differences can be addressed by using the concept of a zone, defined as
a logical or physical grouping of physical, informational, and application as sets
sharing common security requirements. This concept can be applied in an exclusive
manner where some systems are included in the security zone and all others are outside
the zone. A conduit is a particular type of zone that groups communications that can
be logically organized into a grouping of information flows within and also external
to a zone. Channels are the specific communication links established within a
communication conduit.</p>
      <p>A set of ICS functional safety requirement can be found in series of industrial
standards, for example, IEC 61508 “Functional safety of
electrical/electronic/programmable electronic safety-related systems”.</p>
      <p>These functional safety requirements can be divided in some following categories:
 Requirements to functional safety management;
 Requirements to functional safety life cycle;
 Requirements to systematic (system and software design) failures avoidance;
 Requirements to random (hardware) failures avoidance.</p>
      <p>A scope of the above requirements is highly dependent from as named Safety
Integrity Level (SIL) which establishes relation between system risk level and a scope
of the related safety assurance countermeasures.</p>
      <p>This requirement taxonomy can be applied for security concept (see Fig. 4).
Firstly, Security Levels shall be implemented for ICS taken into account risks levels.
Secondly, ISMS shall be implemented and coordinated with functional safety
management issues. Thirdly, a common security and safety life cycle shall be established to
cover all the process of ICS development, verification and validation. Fourthly,
common safety and security risks shall be avoided to implement coordinated
countermeasures against random (hardware) and systematic (system and software design)
failures. Examples of common safety and security random failures avoidance
countermeasure are redundancy, self-diagnostic, hazards protection and others. Examples
of common safety and security systematic failures avoidance (attacks avoidance for
security) are access control and configuration control. Fifty, assessment shall be
periodically performed for both, security and safety. The discussed approach is the base
for security and safety coordination, as it is represented on Fig. 6.</p>
    </sec>
    <sec id="sec-3">
      <title>4 Functional Safety Management Part of Assurance Case Driven</title>
    </sec>
    <sec id="sec-4">
      <title>Design Framework</title>
      <p>The standard IEC 61508 “Functional safety of electrical/electronic/programmable
electronic safety-related systems” has been chosen to specify safety requirements to
ICS. This umbrella safety standard contains seven parts (see Fig. 7) covering different
types of computer control systems for different industrial domains.</p>
      <p>Let’s consider requirements to Functional Safety Management in accordance with
the proposed safety and security requirements structure (see Fig. 8).</p>
      <p>These requirements are contained in Section 6, which is included in parts 1, 2,
and 3 of the IEC 61508. The bulk of the requirements is presented in IEC 61508-1.
There is only a link to IEC 61508-1 in IEC 61508-2. IEC 61508-3 contains an
amendment related with software configuration management. It is reasonable also to
consider Section 5 “Documentation” and Section 8 “Functional Safety Assessment”
of IEC 61508-1, Section 7.1 “General (System safety lifecycle requirements)” of IEC
61508-2, as well as Section 7.4.4 “Requirements for support tools, including
programming languages” of IEC 61508-3.</p>
      <p>The Functional Safety Management Plan (FSMP) shall be elaborated for a specific
ICS implementation project to comply with the above requirements. The FSMP shall
include the following parts:</p>
      <p>The above activities include specific management directions, and this is a reason
why any of such activity request a separated plans and reports. So, the FSMP should
contain only general information without many details.
Fig. 11. A structure software tools profile complied with IEC 61508-3 (Section 7.4.4);
(T1 – generates no outputs which can directly or indirectly contribute to the executable code,
T2 – supports the test or verification of the design or executable code, T3 – generates outputs
which can directly or indirectly contribute to the executable code)
 Project Policy and Strategy;
 Functional Safety Life Cycle and Requirement Tracing;
 Suppliers Management in relation with Quality Management System;
 Security; it should be noted the IEC 61508 contains just very top level
requirements to security; taking into account safety and security requirements
harmonization approach, it would be appropriate to put reference to ISMS documents in this
part of the FSMP.</p>
      <p>Fig. 14 represents a full framework for Functional Safety Management
requirements in accordance with the IEC 61508 (applicable sections from part 1, 2, and 3).</p>
      <p>To give details on the atom requirements level let’s consider Human Resource
Management process. The Human Resource Management Plan (HRMP) shall be
developed to comply with Functional Safety Management requirements. This plan shall
include the following parts which are response to IEC 61508 requirements, marked
below as HRj (see Fig. 13):</p>
      <p>HR1: {The HRMP shall contain Organizational Chart of the ICS implementation
Project};</p>
      <p>HR2: {The HRMP shall contain descriptions of the Project roles in traceable to
Organizational Chart};</p>
      <p>HR3: {The HRMP shall contain Competency Matrix with specified competencies
required for each of the Project role and with results of competencies compliance
evaluation};</p>
      <p>HR4: {The HRMP shall contain references to Training Plan and Training Records,
which are needed to support personnel competencies at the required level; Training
Plan and Training Records shall be available};</p>
      <p>HR5: {The HRMP shall contain participants Communication Plan};</p>
      <p>HR6: {The HRMP shall contain participants list with signature that confirm
awareness concerning the Project roles and responsibilities}.</p>
    </sec>
    <sec id="sec-5">
      <title>5 Application of Assurance Case Driven Design Methodology:</title>
    </sec>
    <sec id="sec-6">
      <title>Human Resource Management Part</title>
      <p>To apply the proposed AC DD methodology to specified requirements
{HR1,…,HR6} we need to establish a structure of SSLC. An example of SSLC for
ICS is presented on Fig. 15.</p>
      <p>Inputs to implement AC DD can be presented in a view of a table (see Table 1),
when rows are equivalent to Life Cycle stages and columns are equivalent to
requirements. In this case the table cells will specify the Assurance Case operations for a
specific requirement at a specific Life Cycle stage.</p>
      <p>A general view of Assurance Case operation can be represented as
Aij(Di,Vi,HRj) = {Cij, a1ij,…,aKij, e1ij,…, eLij, cc1ij,…CCMij, AC1ij,…, ACNij},
where Cij is a claim for i-th SSLC stage (development or V&amp;V) and j-th requirement,
akij is an argument with index from 1 to K, elij is an evidence with index from 1 to L,
CCmij is a coverage criterion with coverage index from 1 to M, ACnij is an
acceptance criterion with index from 1 to N. Some Aij can be repeated without changing
through the SSLC stages, and some Aij can be done once for some specific SSLC
stages and after that missed later SSLC stages.</p>
    </sec>
    <sec id="sec-7">
      <title>6 Conclusions</title>
      <p>The proposed AC DD approach may provide some benefits on the base of from
costeffective as named “embedded certification” briefly described by DVA notation. This
cost-effective solution can work under conditions when the total cost of life cycle
with application of “embedded certification” would be less than the cost of usual life
cycle with usual after life cycle certification, i.e.:</p>
      <p>Cost (DVA Life Cycle) &lt; Cost (DV Life Cycle) + Cost (Certification).</p>
      <p>This paper provides a framework of harmonized safety and security requirements
which are divided into the following groups:
 Requirements to management of safety and security;
 Requirements to Safety and Security Life Cycle;
 Requirements to avoidance of random and systematic failures;
 Requirements to safety and security assessment.</p>
      <p>The next practical steps of AC DD development have to be directed to analyze
existing Safety and Assurance Cases for Internet of Things, cloud computing and big
data analytics as well as to enforce Assurance Cases for IoT products with Security
Informed approach.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Kelly</surname>
            <given-names>T</given-names>
          </string-name>
          (
          <year>1998</year>
          )
          <article-title>Arguing Safety: A Systematic Approach to Managing Safety Cases</article-title>
          .
          <source>PhD thesis</source>
          . University of York
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Leveson</surname>
            <given-names>N</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>A New Accident Model for Engineering Safer Systems</article-title>
          .
          <source>Safety Science</source>
          <volume>42</volume>
          :
          <fpage>237</fpage>
          -
          <lpage>270</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Netkachova</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paulitsch</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bloomfield</surname>
            <given-names>R</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Security-Informed Safety Case Approach to Analysing MILS Systems</article-title>
          . In: Proceedings of International Workshop on MILS:
          <article-title>Architecture and Assurance for Secure Systems</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kharchenko</surname>
            <given-names>VS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sklyar</surname>
            <given-names>VV</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Assurance Case Driven Design for software and hardware description language based systems</article-title>
          .
          <source>Radioelectronic and Computer Systems</source>
          <volume>5</volume>
          (
          <issue>79</issue>
          ):
          <fpage>98</fpage>
          -
          <lpage>103</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Guerra</surname>
            <given-names>S</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Understanding, assessing and justifying I&amp;C systems using Claims, Arguments and Evidence</article-title>
          .
          <source>Nuclear Safety and Simulation</source>
          <volume>5</volume>
          :
          <fpage>15</fpage>
          -
          <lpage>26</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ye</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cleland</surname>
            <given-names>G</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Weapons Operating Centre Approved Code of Practice for Electronic Safety Cases</article-title>
          .
          <source>Adelard LPP</source>
          , London
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Denney</surname>
            <given-names>EW</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pai</surname>
            <given-names>GP</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>A Methodology for the Development of Assurance Arguments for Unmanned Aircraft Systems</article-title>
          .
          <source>In: Proceedings of 33rd International System Safety Conference (ISSC</source>
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Denney</surname>
            <given-names>EW</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pai</surname>
            <given-names>GJ</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Safety Case Patterns: Theory and Applications</article-title>
          . NASA/TM-2015
          <source>-218492. Technical Report</source>
          , NASA
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hawkins</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Habli</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolovos</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paige</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kelly</surname>
            <given-names>T</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Weaving an Assurance Case from Design: A Model-Based Approach</article-title>
          .
          <source>In Proceedings of 16th IEEE International Symposium on High Assurance Systems Engineering (HASE'15)</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Valkonen</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tommila</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linnosmaa</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varkoi</surname>
            <given-names>T</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Safety demonstration of nuclear &amp;C - an introduction</article-title>
          .
          <source>SAUNA Task 3.1 report. VTT-R-00167-16. Research report</source>
          , VTT
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sklyar</surname>
            <given-names>V</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Safety-critical Certification of FPGA-based Platform against Requirements of U.S. Nuclear Regulatory Commission (NRC): Industrial Case Study</article-title>
          .
          <source>In: Proceedings of the 12th International Conference on ICT in Education, Research and Industrial Applications</source>
          . Integration,
          <article-title>Harmonization and Knowledge (ICTERI</article-title>
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. IEC 61508 (
          <year>2010</year>
          )
          <article-title>Functional safety of electrical/electronic/programmable electronic safety-related systems (in 7 parts)</article-title>
          . Geneva, IEC
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Medoff</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faller</surname>
            <given-names>R</given-names>
          </string-name>
          (
          <year>2010</year>
          )
          <article-title>Functional Safety - An IEC 61508 SIL 3 Compatible Development Process</article-title>
          . exida.com
          <string-name>
            <given-names>L.L.C.</given-names>
            ,
            <surname>Sellersville</surname>
          </string-name>
          , PA, USA
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sklyar</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharchenko</surname>
            <given-names>V</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Assurance Case Driven Design for Computer Systems:</article-title>
          <source>Graphical Notations versus Mathematical Methods In: Proceedings of the Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI</source>
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <source>NIST SP 800-82</source>
          (
          <year>2015</year>
          )
          <article-title>Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as PLC</article-title>
          .
          <article-title>- National Institute of Standards and Technologies, Gaithersburg</article-title>
          ,
          <string-name>
            <surname>MD</surname>
          </string-name>
          , USA
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>