=Paper=
{{Paper
|id=Vol-241/paper-1
|storemode=property
|title=Structuring Safety Policy Decomposition
|pdfUrl=https://ceur-ws.org/Vol-241/paper1.pdf
|volume=Vol-241
|authors=Martin Hall-May,Tim Kelly
|dblpUrl=https://dblp.org/rec/conf/caise/Hall-MayK06
}}
==Structuring Safety Policy Decomposition==
REMO2V'06 787
Structuring Safety Policy Decomposition
Martin Hall-May and Tim Kelly
Department of Computer Science
University of York, York, YO10 5DD, UK
{martin.hall-may, tim.kelly}@cs.york.ac.uk
Abstract. Safety policy is a collection of rules that govern the behaviour of en-
tities such that they do not cause accidents. It has been suggested that policies in
general can be expressed at various levels of abstraction and organised as a hier-
archy of goals. In developing policy, it is desirable to decompose from top-level
objectives down to rules in a structured manner. The Goal Structuring Notation
(GSN) allows us to model the policy decomposition in order to scrutinise and
better understand the development process. In so doing, a number of issues arise
concerning reusable patterns of decomposition and the assumed models of the
system whose behaviour the policy is intended to govern. This paper discusses
the need to structure a safety policy decomposition and how modelling techniques
and patterns can aid in this.
1 Introduction
Complex networks of interacting entities, such as systems of systems [1], multi-agent
systems and organisations of individuals, are governed by rules, procedures, laws, codes
and conventions. Irrespective of the nomenclature, these regulations can be seen as
forming a policy that governs the behaviour of the entities interacting as part of a larger
network. This policy is orthogonal to the immediate aims and objectives of the entities
and restricts their actions such that they do not engage in undesired behaviour. The
policy is, as such, persistent, in that it is relatively invariant over a period of time [2].
Developing such a policy is a significant challenge.
Policy can be formulated according to any of several criteria. For example, a safety
policy describes how to protect the physical integrity of a system, a security policy
describes how to protect data integrity within a system, while a usage policy describes
the rights and privileges of the users of a system. This paper focuses on the concept of
a safety policy.
2 Safety Policy
Policy is defined variously in literature, but the most generally applicable system-oriented
definition is given in [3]: “A policy is a rule that defines a choice in behaviour of a sys-
tem.” Safety policy is defined as the choice in behaviour that does not contribute to a
hazardous situation, or through action actively mitigates a hazard.
Government and organisational policy, among others, are mainly described in lengthy
prose, often ambiguous and open to (mis-)interpretation. Wies, in [4], illustrates the
788 Regulations Modelling and their Validation and Verification
problem by noting the confused nature of many (security) policy specifications, which
combine in the same document high-level statements concerning network accessibility
with low-level statements about the blocking of certain IP addresses.
To take another example, the Rules of the Air [5] describe the policy that a pilot
must follow in order to fly safely in UK civil airspace. The resulting document de-
scribes a set of rules that are often obvious, but the rationale behind which has been
lost. This has implications for traceability and change management, should the original
reason behind the policy rules change. Furthermore, hiding the rationale in such a way
affects the ability to scrutinise or analyse the policy and thereby gain confidence in its
completeness and consistency.
2.1 Policy Decomposition
There is an increasing desire to manage complex networks of autonomous systems us-
ing policy. Humans may be adept at interpreting informally expressed policies, but their
interpretations are rarely consistent and can not be easily automated given the current
state of technology [6]. An analogy has been drawn to creating computer code from an
abstract set of requirements [7]. Clearly there is a need to organise, or classify, policies
expressed at various levels of abstraction into a hierarchy.
Policy decomposition refers to the transformation of high-level policy specifications
into more specific policies that are defined in terms of lower-level entities and opera-
tions of the system [8]. This decomposition is necessary because policies are more nat-
urally expressed, at least initially, at a high level, since they are typically derived from
management — or business — goals. Such a level of abstraction hides system specifics,
so that policy-makers are not faced with excessive detail. Moreover, high-level policy
is not constrained to any particular underlying resources and will therefore not break in
the face of a change in said resources. Indeed, it may not at first be known what target
resources are necessary or available.
The Goal Structuring Notation (GSN) [9] — typically used to construct safety cases
— is used here to represent the policy decomposition structure. Figure 1 shows an ex-
ample excerpt of such a policy decomposition modelled using this notation. Rectangular
nodes represent goals, while parallelograms indicate the strategy by which a policy goal
is decomposed to an increased level of specificity. Goals and strategies are expressed in
a context, which is indicated by rounded rectangles. In representing the policy in this
manner, we are bringing the process by which it is derived under increased scrutiny,
which raises several issues about its development. Since there are often several ways
to decompose any policy goal, the policy is not an unambiguous refinement, rather
it attempts to provide qualitative justification for the decomposition of goals to rules.
Two aspects of the decomposition process are important to the confidence in this jus-
tification, namely the use of models in system assumptions and common patterns of
decomposition. These will be the focus of the remainder of the paper.
3 Modelling
The informal role of models in policy-making is well established [10]. Theoretical as
well as empirical models are used by Government and other decision-makers to set
REMO2V'06 789
Avoid Infantry Attack Shared target
Infantry transported
Artillery must avoid
close to artillery target
attacking infantry by helicopter
Location of Agent
Decompose over
knowledge of infantry
location
Avoid Known Friendly Avoid Unknown Friendly
Locations Locations
Artillery must avoid Artillery must avoid
attacking infantry at known attacking infantry at
location unknown location
Provide Location Artillery Avoid Attack On Shared Picture Infantry Avoid Artillery Artillery Alert Attack
Location Target
Infantry must update theatre Communication between
Artillery must avoid attack infantry and artillery is via Infantry must avoid areas that Artillery must alert theatre
command with current
location at least every ten on last known infantry shared picture held by are designated as current command at least ten minutes
minutes location in shared picture theatre command target for the artillery in the before launching an attack
shared picture
Avoid Friendly Attack
Artillery must avoid
attacking friendly
agents
Fig. 1. An Excerpt from a Safety Policy Decomposition in GSN
Friendly Agents
Decompose over
policies on a number of issues, ranging from health and the economy to the environ-
friendly agents
ment. Indeed, the defence industry uses models to guide combat decisions based on
their knowledge, assumptions and best guesses of enemy capability, the anticipated
operational environment as well as the configuration and inter-operation of their own
forces.
Models serve two purposes in policy decomposition. Firstly, they aid in decom-
posing safety goals, together with patterns of decomposition, by providing the policy-
maker with factors that should be considered in the achievement of the top-level goal.
Secondly, the models provide a vocabulary for the expression of these goals. In this way,
templates can be created that are more structured than the “noun-phrase verb-phrase”
of traditional safety case goal statements.
In the decomposition of safety policy, models help us to understand the abstract
features of hazards and to mitigate them through a general type of policy rather than
applying a sticking plaster to every specific instance of the hazard, which quickly be-
comes unwieldy and inconsistent, leaving loop holes and areas of overlap or conflict.
We suggest modelling the system under consideration according to three viewpoints,
viz. an agent, a domain and a causal viewpoint.
3.1 Agent Viewpoint
Taking inspiration from multi-agent systems development, it is important for the devel-
opment of safety policy to have a good understanding of the capabilities of, and com-
munications between, the entities in the system. Using a suitable methodology, such as
the Process for Agent Societies Specification and Implementation (PASSI) [11], several
models of the agent society can be generated. These include describing how the entire
required system functionality is apportioned to individual agents according to their spe-
cialisations and capabilities, and the modelling of envisaged scenarios of interactions.
This is important in order to consider the types of communications that will occur as
790 Regulations Modelling and their Validation and Verification
well as which agent relies on the services or knowledge of another. Hazards can arise
as a result of the incorrect provision of such services, provision when not expected, or
absence of provision.
3.2 Domain Viewpoint
In understanding how an agent might misinterpret something we need to know addi-
tional properties about the domain in which it operates. This includes the ontology it
uses, i.e. how it represents knowledge of what exists, and assumptions about the proper-
ties of these concepts. In ontologies, e.g. Cyc [12], predicates define how concepts are
related and which actions can be performed on certain concepts. For example, an agent
might know that a pilot flies an aeroplane, which is a kind of fixed-wing aircraft and
which is capable of being airborne. Similarly, the absence of such a predicate would in-
dicate that a pilot cannot fly a tank. The unambiguous representation of such knowledge
is critical in safety-related applications, since any misinterpretation in communications
from one agent to another can lead to hazards.
3.3 Causal Viewpoint
The causal viewpoint recognises that accidents in complex systems arise out of, as
Perrow described, dysfunctional interactions [13]. The accident model, STAMP [14],
recognises the importance of this type of interaction in safety-critical applications. Sim-
ilarly, we must take a more systems-theoretic approach to describing the relationships
between causal factors in the lead up to an accident, rather than traditional chain-of-
event failure models such as Fault Trees. Behaviour typical of complex systems results
from multiple interacting feedback loops. This means that it is not possible to take a me-
chanical approach to working through the causal chain, because many factors influence
each other as well as, indirectly, influencing themselves.
Multi-agent Influence Diagrams (MAIDs) [15] are an extension to Bayesian belief
networks and decision networks, which are suited to describing processes composed of
locally interacting components. Using them it is possible to represent how agents’ de-
cisions are influenced by various factors. These factors include probabilistic variables
(represented by circular ‘chance’ nodes) that are, in effect, ‘decided’ by the environ-
ment, as well as the results of other agents’ decisions (rectangular nodes). The ‘utility’
of the decisions to the agents, i.e. their preference for the result of a particular decision
in terms of the cost or benefit to them, is represented by diamond-shaped nodes.
Figure 2 gives a simplified example of two agents’ decisions. The artillery’s decision
to launch an attack is based on the decision of an unmanned air vehicle (UAV) spotting
an enemy target. In reality, the artillery cannot directly observe the UAV’s decision,
hence its own action is influenced by many other chance variables, such as the accuracy
of the UAV’s sensor and the state of the communications network. Models of this type
are important in order to consider which variables in the system influence which other
variables and whether these variables are determined by chance or are under the control
of an intelligent agent.
Key
REMO2V'06 791 UAV Gun Heli
Cost
Cost
(from
(from UAV)
Artillery)
Nominate Launch
Target Attack Win
(from UAV) (from Artillery)
Enemy Enemy Enemy
Status Status Status
(t-1) (t) (t+1)
Gun
Accuracy
(t+1)
UAV UAV UAV
Sensor Sensor Sensor
(t-1) (t) (t+1)
Sensor Sensor Sensor
Status Status Status
(t-1) (t) (t+1)
Data Data Data
Fusion Fusion Fusion
(t-1) (t) (t+1)
Comms Comms Comms
Status Status Status
(t-1) (t) (t+1)
Fig. 2. A Multi-agent Influence Diagram Representing Two Agents’ Decisions
4 Patterns
Often in the development of policy, the same type of decomposition is used repeatedly.
This leads us naturally to think about structuring policy around patterns of decompo-
sition. Patterns can be based on considering agent capabilities, cooperation between
agents, milestones in a sequence of tasks that an agent must carry out to achieve its
objective, as well decomposing according to the types of case in which the policy must
apply. Unfortunately, space constraints do not allow a more detailed treatment of this
issue, however we would direct the interested reader to a previous paper [16].
5 Summary
A safety policy defines the set of rules that governs the safe interaction of a society
of entities. In practice, policies are expressed at various levels of abstraction and can
be modelled using GSN as a structure of increasingly specific goals. These goals are
decomposed according to strategies. However, the decomposition process is not obvious
and relies on the repeated application of patterns and the use of system modelling.
6 Acknowledgement
This work is carried out under the High Integrity Real Time Systems Defence and
Aerospace Research Partnership (HIRTS DARP), funded by the MoD, DTI and EPSRC.
The current members of the HIRTS DARP are BAE SYSTEMS, Rolls-Royce plc, Qine-
tiQ and the University of York.
792 Regulations Modelling and their Validation and Verification
References
1. Alexander, R., Hall-May, M., Kelly, T.: Characteristic failure modes in systems of systems.
In: Proceedings of the 22nd International System Safety Conference, Providence, Rhode
Island, System Safety Society (2004) 499–508
2. Moffett, J.D., Sloman, M.S.: The representation of policies as system objects. In: Proceed-
ings of the Conference on Organizational Computing Systems, Atlanta, Georgia, USA, ACM
Press (1991) 171–184
3. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Managing security in object-based dis-
tributed systems using Ponder. In: Proceedings of the 6th Open European Summer School
(Eunice 2000), Twente University Press (2000)
4. Wies, R.: Using a classification of management policies for policy specification and pol-
icy transformation. In Sethi, A.S., Raynaud, Y., Fure-Vincent, F., eds.: Proceedings of the
IFIP/IEEE International Symposium on Integrated Network Management. Volume 4., Santa
Barbara, California, USA, Chapman & Hall (1995) 44–56
5. Allan, R., ed.: Air Navigation: The Order and the Regulations. third edn. Civil Aviation
Authority (2003)
6. Moffett, J.D., Sloman, M.S.: Policy hierarchies for distributed systems management. IEEE
Journal on Selected Areas in Communication 11(9) (1993) 1404–1414
7. Sloman, M.: Policy driven management for distributed systems. Journal of Network and
Systems Management 2(4) (1994) 333–360
8. Bandara, A., Lupu, E., Russo, A.: Using event calculus to formalise policy specification and
analysis. In: Proceedings of the 4th IEEE Workshop on Policies for Distributed Systems and
Networks, Lake Como, Italy (2003) 26–39
9. Kelly, T.P.: Arguing Safety—A Systematic Approach to Managing Safety Cases. DPhil
thesis, University of York, Heslington, York, YO10 5DD, UK (1998)
10. Weinstein, M.C., Toy, E.L., Sandberg, E.A., Neumann, P.J., Evans, J.S., Kuntz, K.M., Gra-
ham, J.D., Hammitt, J.K.: Modeling for health care and other policy decisions: Uses, roles,
and validity. Value Health 4(5) (2001) 348–61
11. Cossentino, M., Potts, C.: PASSI: A process for specifying and implementing multi-agent
systems using UML. (2002)
12. Guha, R.V., Lenat, D.B.: Cyc: A midterm report. AI Magazine 11 (1990) 32–59
13. Perrow, C.: Normal Accidents: Living with High-Risk Technologies. Princeton University
Press (1999)
14. Leveson, N.G.: A new accident model for engineering safer systems. Safety Science 42(4)
(2004)
15. Koller, D., Milch, B.: Structured models for multi-agent interactions. In: Proceedings of the
8th conference on Theoretical Aspects of Rationality and Knowledge, Siena, Italy, Morgan
Kaufmann Publishers Inc. (2001) 233–248
16. Hall-May, M., Kelly, T.P.: Defining and decomposing safety policy for systems of systems.
In: Proceedings of the 24th International Conference on Computer Safety, Reliability and
Security (SAFECOMP ’05). Volume 3688 of LNCS., Fredrikstad, Norway (2005) 37–51