<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Structuring Safety Policy Decomposition</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Hall-May</string-name>
          <email>martin.hall-may@cs.york.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tim Kelly</string-name>
          <email>tim.kelly@cs.york.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science University of York</institution>
          ,
          <addr-line>York, YO10 5DD</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <fpage>787</fpage>
      <lpage>792</lpage>
      <abstract>
        <p>Safety policy is a collection of rules that govern the behaviour of entities such that they do not cause accidents. It has been suggested that policies in general can be expressed at various levels of abstraction and organised as a hierarchy of goals. In developing policy, it is desirable to decompose from top-level objectives down to rules in a structured manner. The Goal Structuring Notation (GSN) allows us to model the policy decomposition in order to scrutinise and better understand the development process. In so doing, a number of issues arise concerning reusable patterns of decomposition and the assumed models of the system whose behaviour the policy is intended to govern. This paper discusses the need to structure a safety policy decomposition and how modelling techniques and patterns can aid in this.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Complex networks of interacting entities, such as systems of systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], multi-agent
systems and organisations of individuals, are governed by rules, procedures, laws, codes
and conventions. Irrespective of the nomenclature, these regulations can be seen as
forming a policy that governs the behaviour of the entities interacting as part of a larger
network. This policy is orthogonal to the immediate aims and objectives of the entities
and restricts their actions such that they do not engage in undesired behaviour. The
policy is, as such, persistent, in that it is relatively invariant over a period of time [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Developing such a policy is a significant challenge.
      </p>
      <p>Policy can be formulated according to any of several criteria. For example, a safety
policy describes how to protect the physical integrity of a system, a security policy
describes how to protect data integrity within a system, while a usage policy describes
the rights and privileges of the users of a system. This paper focuses on the concept of
a safety policy.
problem by noting the confused nature of many (security) policy specifications, which
combine in the same document high-level statements concerning network accessibility
with low-level statements about the blocking of certain IP addresses.</p>
      <p>
        To take another example, the Rules of the Air [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] describe the policy that a pilot
must follow in order to fly safely in UK civil airspace. The resulting document
describes a set of rules that are often obvious, but the rationale behind which has been
lost. This has implications for traceability and change management, should the original
reason behind the policy rules change. Furthermore, hiding the rationale in such a way
affects the ability to scrutinise or analyse the policy and thereby gain confidence in its
completeness and consistency.
2.1
      </p>
      <sec id="sec-1-1">
        <title>Policy Decomposition</title>
        <p>
          There is an increasing desire to manage complex networks of autonomous systems
using policy. Humans may be adept at interpreting informally expressed policies, but their
interpretations are rarely consistent and can not be easily automated given the current
state of technology [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. An analogy has been drawn to creating computer code from an
abstract set of requirements [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Clearly there is a need to organise, or classify, policies
expressed at various levels of abstraction into a hierarchy.
        </p>
        <p>
          Policy decomposition refers to the transformation of high-level policy specifications
into more specific policies that are defined in terms of lower-level entities and
operations of the system [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. This decomposition is necessary because policies are more
naturally expressed, at least initially, at a high level, since they are typically derived from
management — or business — goals. Such a level of abstraction hides system specifics,
so that policy-makers are not faced with excessive detail. Moreover, high-level policy
is not constrained to any particular underlying resources and will therefore not break in
the face of a change in said resources. Indeed, it may not at first be known what target
resources are necessary or available.
        </p>
        <p>
          The Goal Structuring Notation (GSN) [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] — typically used to construct safety cases
— is used here to represent the policy decomposition structure. Figure 1 shows an
example excerpt of such a policy decomposition modelled using this notation. Rectangular
nodes represent goals, while parallelograms indicate the strategy by which a policy goal
is decomposed to an increased level of specificity. Goals and strategies are expressed in
a context, which is indicated by rounded rectangles. In representing the policy in this
manner, we are bringing the process by which it is derived under increased scrutiny,
which raises several issues about its development. Since there are often several ways
to decompose any policy goal, the policy is not an unambiguous refinement, rather
it attempts to provide qualitative justification for the decomposition of goals to rules.
Two aspects of the decomposition process are important to the confidence in this
justification, namely the use of models in system assumptions and common patterns of
decomposition. These will be the focus of the remainder of the paper.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Modelling</title>
      <p>
        The informal role of models in policy-making is well established [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Theoretical as
well as empirical models are used by Government and other decision-makers to set
Avoid Infantry Attack
Artilery must avoid
attacking infantry
      </p>
      <p>Location of Agent
Decompose over
knowledge of infantry
location
Avoid Known Friendly
Locations
Artilery must avoid
attacking infantry at known
location</p>
      <p>Avoid Unknown Friendly
Locations
Artilery must avoid
attacking infantry at
unknown location</p>
      <p>Shared target
Infantry transported
close to artilery target
by helicopter
Provide Location
Infantry must update theatre
command with current
location at least every ten
minutes</p>
      <p>Artillery Avoid Attack On
Location
Artilery must avoid attack
on last known infantry
location in shared picture</p>
      <p>Shared Picture
Communication between
infantry and artilery is via
shared picture held by
theatre command</p>
      <p>Infantry Avoid Artillery
Target
Infantry must avoid areas that
are designated as current
target for the artil ery in the
shared picture</p>
      <p>Artillery Alert Attack
Artil ery must alert theatre
command at least ten minutes
before launching an attack
Avoid Friendly Attack
Artil ery must avoid Fig. 1. An Excerpt from a Safety Policy Decomposition in GSN
attacking friendly
agents</p>
      <p>Friendly Agents
policie sfDrieecnoodmlynpaogseeanotsvenr umber of issues, ranging from health and the economy to the
environment. Indeed, the defence industry uses models to guide combat decisions based on
their knowledge, assumptions and best guesses of enemy capability, the anticipated
operational environment as well as the configuration and inter-operation of their own
forces.</p>
      <p>Models serve two purposes in policy decomposition. Firstly, they aid in
decomposing safety goals, together with patterns of decomposition, by providing the
policymaker with factors that should be considered in the achievement of the top-level goal.
Secondly, the models provide a vocabulary for the expression of these goals. In this way,
templates can be created that are more structured than the “noun-phrase verb-phrase”
of traditional safety case goal statements.</p>
      <p>In the decomposition of safety policy, models help us to understand the abstract
features of hazards and to mitigate them through a general type of policy rather than
applying a sticking plaster to every specific instance of the hazard, which quickly
becomes unwieldy and inconsistent, leaving loop holes and areas of overlap or conflict.
We suggest modelling the system under consideration according to three viewpoints,
viz. an agent, a domain and a causal viewpoint.
3.1</p>
      <sec id="sec-2-1">
        <title>Agent Viewpoint</title>
        <p>
          Taking inspiration from multi-agent systems development, it is important for the
development of safety policy to have a good understanding of the capabilities of, and
communications between, the entities in the system. Using a suitable methodology, such as
the Process for Agent Societies Specification and Implementation (PASSI) [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], several
models of the agent society can be generated. These include describing how the entire
required system functionality is apportioned to individual agents according to their
specialisations and capabilities, and the modelling of envisaged scenarios of interactions.
This is important in order to consider the types of communications that will occur as
well as which agent relies on the services or knowledge of another. Hazards can arise
as a result of the incorrect provision of such services, provision when not expected, or
absence of provision.
3.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Domain Viewpoint</title>
        <p>
          In understanding how an agent might misinterpret something we need to know
additional properties about the domain in which it operates. This includes the ontology it
uses, i.e. how it represents knowledge of what exists, and assumptions about the
properties of these concepts. In ontologies, e.g. Cyc [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], predicates define how concepts are
related and which actions can be performed on certain concepts. For example, an agent
might know that a pilot flies an aeroplane, which is a kind of fixed-wing aircraft and
which is capable of being airborne. Similarly, the absence of such a predicate would
indicate that a pilot cannot fly a tank. The unambiguous representation of such knowledge
is critical in safety-related applications, since any misinterpretation in communications
from one agent to another can lead to hazards.
3.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Causal Viewpoint</title>
        <p>
          The causal viewpoint recognises that accidents in complex systems arise out of, as
Perrow described, dysfunctional interactions [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. The accident model, STAMP [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ],
recognises the importance of this type of interaction in safety-critical applications.
Similarly, we must take a more systems-theoretic approach to describing the relationships
between causal factors in the lead up to an accident, rather than traditional
chain-ofevent failure models such as Fault Trees. Behaviour typical of complex systems results
from multiple interacting feedback loops. This means that it is not possible to take a
mechanical approach to working through the causal chain, because many factors influence
each other as well as, indirectly, influencing themselves.
        </p>
        <p>
          Multi-agent Influence Diagrams (MAIDs) [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] are an extension to Bayesian belief
networks and decision networks, which are suited to describing processes composed of
locally interacting components. Using them it is possible to represent how agents’
decisions are influenced by various factors. These factors include probabilistic variables
(represented by circular ‘chance’ nodes) that are, in effect, ‘decided’ by the
environment, as well as the results of other agents’ decisions (rectangular nodes). The ‘utility’
of the decisions to the agents, i.e. their preference for the result of a particular decision
in terms of the cost or benefit to them, is represented by diamond-shaped nodes.
        </p>
        <p>Figure 2 gives a simplified example of two agents’ decisions. The artillery’s decision
to launch an attack is based on the decision of an unmanned air vehicle (UAV) spotting
an enemy target. In reality, the artillery cannot directly observe the UAV’s decision,
hence its own action is influenced by many other chance variables, such as the accuracy
of the UAV’s sensor and the state of the communications network. Models of this type
are important in order to consider which variables in the system influence which other
variables and whether these variables are determined by chance or are under the control
of an intelligent agent.</p>
        <p>Gun</p>
        <p>Heli</p>
        <p>Cost
(from UAV)</p>
        <p>Cost
(from</p>
        <p>Artil ery)
Nominate
Target
(from UAV)</p>
        <p>Launch</p>
        <p>Attack
(from Artil ery)</p>
        <p>Win
Sensor
Status
(t-1)
Comms
Status
(t-1)</p>
        <p>Enemy
Status
(t-1)
UAV
Sensor
(t-1)
Data
Fusion
(t-1)</p>
        <p>Sensor
Status
(t)
Comms
Status
(t)</p>
        <p>Enemy
Status
(t)
UAV
Sensor
(t)
Data
Fusion
(t)</p>
        <p>Gun
Accuracy
(t+1)
Sensor
Status
(t+1)
Comms
Status
(t+1)</p>
        <p>
          Enemy
Status
(t+1)
UAV
Sensor
(t+1)
Data
Fusion
(t+1)
Often in the development of policy, the same type of decomposition is used repeatedly.
This leads us naturally to think about structuring policy around patterns of
decomposition. Patterns can be based on considering agent capabilities, cooperation between
agents, milestones in a sequence of tasks that an agent must carry out to achieve its
objective, as well decomposing according to the types of case in which the policy must
apply. Unfortunately, space constraints do not allow a more detailed treatment of this
issue, however we would direct the interested reader to a previous paper [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
5
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Summary</title>
      <p>A safety policy defines the set of rules that governs the safe interaction of a society
of entities. In practice, policies are expressed at various levels of abstraction and can
be modelled using GSN as a structure of increasingly specific goals. These goals are
decomposed according to strategies. However, the decomposition process is not obvious
and relies on the repeated application of patterns and the use of system modelling.
6</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgement</title>
      <p>This work is carried out under the High Integrity Real Time Systems Defence and
Aerospace Research Partnership (HIRTS DARP), funded by the MoD, DTI and EPSRC.
The current members of the HIRTS DARP are BAE SYSTEMS, Rolls-Royce plc,
QinetiQ and the University of York.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alexander</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Hall-May,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>Characteristic failure modes in systems of systems</article-title>
          .
          <source>In: Proceedings of the 22nd International System Safety Conference</source>
          , Providence, Rhode Island,
          <source>System Safety Society</source>
          (
          <year>2004</year>
          )
          <fpage>499</fpage>
          -
          <lpage>508</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Moffett</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sloman</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>The representation of policies as system objects</article-title>
          .
          <source>In: Proceedings of the Conference on Organizational Computing Systems</source>
          , Atlanta, Georgia, USA, ACM Press (
          <year>1991</year>
          )
          <fpage>171</fpage>
          -
          <lpage>184</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Damianou</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dulay</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lupu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sloman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Managing security in object-based distributed systems using Ponder</article-title>
          .
          <source>In: Proceedings of the 6th Open European Summer School (Eunice</source>
          <year>2000</year>
          ), Twente University Press (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Wies</surname>
          </string-name>
          , R.:
          <article-title>Using a classification of management policies for policy specification and policy transformation</article-title>
          . In Sethi,
          <string-name>
            <given-names>A.S.</given-names>
            ,
            <surname>Raynaud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Fure-Vincent</surname>
          </string-name>
          , F., eds.
          <source>: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management</source>
          . Volume
          <volume>4</volume>
          ., Santa Barbara, California, USA, Chapman &amp; Hall (
          <year>1995</year>
          )
          <fpage>44</fpage>
          -
          <lpage>56</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Allan</surname>
          </string-name>
          , R., ed.: Air Navigation:
          <article-title>The Order and the Regulations. third edn</article-title>
          .
          <source>Civil Aviation Authority</source>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Moffett</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sloman</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>Policy hierarchies for distributed systems management</article-title>
          .
          <source>IEEE Journal on Selected Areas in Communication</source>
          <volume>11</volume>
          (
          <issue>9</issue>
          ) (
          <year>1993</year>
          )
          <fpage>1404</fpage>
          -
          <lpage>1414</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Sloman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Policy driven management for distributed systems</article-title>
          .
          <source>Journal of Network and Systems Management</source>
          <volume>2</volume>
          (
          <issue>4</issue>
          ) (
          <year>1994</year>
          )
          <fpage>333</fpage>
          -
          <lpage>360</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Bandara</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lupu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Using event calculus to formalise policy specification and analysis</article-title>
          .
          <source>In: Proceedings of the 4th IEEE Workshop on Policies for Distributed Systems and Networks</source>
          , Lake Como,
          <string-name>
            <surname>Italy</surname>
          </string-name>
          (
          <year>2003</year>
          )
          <fpage>26</fpage>
          -
          <lpage>39</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kelly</surname>
            ,
            <given-names>T.P.</given-names>
          </string-name>
          :
          <article-title>Arguing Safety-A Systematic Approach to Managing Safety Cases</article-title>
          .
          <source>DPhil thesis</source>
          , University of York, Heslington, York, YO10 5DD,
          <string-name>
            <surname>UK</surname>
          </string-name>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Weinstein</surname>
            ,
            <given-names>M.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toy</surname>
            ,
            <given-names>E.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandberg</surname>
            ,
            <given-names>E.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neumann</surname>
            ,
            <given-names>P.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Evans</surname>
            ,
            <given-names>J.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuntz</surname>
            ,
            <given-names>K.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Graham</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammitt</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          :
          <article-title>Modeling for health care and other policy decisions: Uses, roles, and validity</article-title>
          .
          <source>Value Health</source>
          <volume>4</volume>
          (
          <issue>5</issue>
          ) (
          <year>2001</year>
          )
          <fpage>348</fpage>
          -
          <lpage>61</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Cossentino</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potts</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>PASSI: A process for specifying and implementing multi-agent systems using UML</article-title>
          . (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Guha</surname>
            ,
            <given-names>R.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenat</surname>
            ,
            <given-names>D.B.</given-names>
          </string-name>
          :
          <article-title>Cyc: A midterm report</article-title>
          .
          <source>AI</source>
          Magazine
          <volume>11</volume>
          (
          <year>1990</year>
          )
          <fpage>32</fpage>
          -
          <lpage>59</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Perrow</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : Normal Accidents:
          <article-title>Living with High-Risk Technologies</article-title>
          . Princeton University Press (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Leveson</surname>
            ,
            <given-names>N.G.</given-names>
          </string-name>
          :
          <article-title>A new accident model for engineering safer systems</article-title>
          .
          <source>Safety Science</source>
          <volume>42</volume>
          (
          <issue>4</issue>
          ) (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Koller</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milch</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Structured models for multi-agent interactions</article-title>
          .
          <source>In: Proceedings of the 8th conference on Theoretical Aspects of Rationality and Knowledge</source>
          , Siena, Italy, Morgan Kaufmann Publishers Inc. (
          <year>2001</year>
          )
          <fpage>233</fpage>
          -
          <lpage>248</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hall-May</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kelly</surname>
            ,
            <given-names>T.P.</given-names>
          </string-name>
          :
          <article-title>Defining and decomposing safety policy for systems of systems</article-title>
          .
          <source>In: Proceedings of the 24th International Conference on Computer Safety, Reliability and Security (SAFECOMP '05)</source>
          . Volume 3688 of LNCS.,
          <string-name>
            <surname>Fredrikstad</surname>
          </string-name>
          , Norway (
          <year>2005</year>
          )
          <fpage>37</fpage>
          -
          <lpage>51</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>