Username   Password       Forgot your password?  Forgot your username? 

Automatic Generation of the AADL ALISA Verification Plan with ATL

Volume 13, Number 7, November 2017 - Paper 14  - pp. 1111-1122
DOI: 10.23940/ijpe.17.07.p14.11111122

Tianyi Wua, Zhiqiu Huanga,*, Zhibin Yanga, Tiexin Wanga, Lei Xueb

aNanjing University of Aeronautics and Astronautics, 29 Jiangjun Road, Nanjing 211106, China
bShanghai Aerospace Electronic Technology Institute, Shanghai 201109, China

(Submitted on July 25, 2017; Revised on August 30, 2017; Accepted on September 15, 2017)


Architecture Led Incremental System Assurance short for ALISA presents a method to check if a system implementation meets its requirements. This method helps find errors in the early phase of system integration. ALISA provides four notations—requirements specifications, architecture models, verification techniques and assurance cases. The verification plan, which is designed by extracting information from requirement specification and architecture model, can be executed on the system and the result is significant metrics to judge the system quality. There are problems when generating a verification plan. As for the hierarchical architecture model with increasing complexity, the system may be divided into several parts and it is difficult to accomplish the assurance manually for each tier of the architecture. The approach also needs to respond to the ever-changing demands rapidly. New faults may be introduced artificially when designing requirement specifications and verification plans. In the paper, we propose an approach which uses ATL, whose full name is ATLAS transformation language, to help automatically generate verification plans. The meta-model of the verification plan and of requirement specification are given. Thus, designing the transformation rules from the verification part to the requirement part is easy. A lightweight template described in ATL is used to generate the verification plan for critical requirement and quality property.


References: 22

        1. A. Albinet, J. L. Boulanger, H. Dubois, M. A. Peraldi-Frati, Y. Sorel, and Q. D. Van, "Model-Based Methodology for Requirements Traceability in Embedded Systems," 2007.
        2. D. Blouin, E. Senn, and S. Turki, "Defining an Annex Language to the Architecture Analysis and Design Language for Requirements Engineering Activities Support," in Model-Driven Requirements Engineering Workshop, 2011, pp. 11-20.
        3. J. S. Cuadrado, E. Guerra, and J. D. Lara, "Flexible Model-to-Model Transformation Templates: An Application to ATL," in International Conference on Prostate Cancer Imaging: Image Analysis and Image-Guided Interventions, 2011, pp. 70-79.
        4. J. Delange, P. Feiler, and N. Ernst, "Incremental Life Cycle Assurance of Safety-Critical Systems," in Ertss, 2016.
        5. J. Delange, P. Feiler, and L. Wrage, "A Requirement Specification Language for AADL," 2016.
        6. N. Drivalos, R. F. Paige, K. J. Fernandes, and D. S. Kolovos, "Towards Rigorously Defined Model-to-Model Traceability," in Ecmda Traceability Workshop Sintef Technical Report, 2008
        7. P. Feiler, "Open Source AADL Tool Environment (OSATE)," Aadl Workshop, 2004.
        8. P. Feiler, "Requirements and Architecture Specification of the Joint Multi-Role (JMR) Joint Common Architecture (JCA) Demonstration System," 2015.
        9. P. H. Feiler, D. P. Gluch, and J. J. Hudak, "The Architecture Analysis & Design Language (AADL): An Introduction," 2006.
        10. M. Galster, A. Eberlein, and M. Moussavi, "Transition from Requirements to Architecture: A Review and Future Perspective," in Acis International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing, 2006, pp. 9-16.
        11. A. Goknil, I. Kurtev, and V. D. B. Klaas, "A Rule-Based Approach for Evolution of AADL Models Based on Changes in Functional Requirements," in Proccedings of the European Conference on Software Architecture Workshops, 2016, p. 10.
        12. A. Group, "ATL: Atlas Transformation Language," 2006.
        13. Á. Jiménez, D. Granada, V. Bollati, and J. M. Vara, "Using ATL to support Model-Driven Development of RubyTL Model Transformations," in Proceedings of the third International Workshop on Model Transformation with ATL, pp 35-48, 2014.
        14. J. Kovse and T. Härder, "Generic XMI-Based UML Model Transformations," Lecture Notes in Computer Science, vol. 2425, pp. 192-198, 2002.
        15. J. D. Lara and E. Guerra, "Towards the flexible reuse of model transformations: A formal approach based on graph transformation," Journal of Logical & Algebraic Methods in Programming, vol. 83, no. 5-6, pp. 427-458, 2014.
        16. C. Ponsard and M. Delehaye, "Towards a Model-Driven Approach for Mapping Requirements on AADL Architectures," in IEEE International Conference on Engineering of Complex Computer Systems, 2009, pp. 353-358.
        17. B. Schätz, V. Aravantinos, S. Voss, S. Teufl, and F. Hözl, "AutoFOCUS 3: Tooling Concepts for Seamless, Model-based Development of Embedded Systems," in International Workshop on Model-Based Architecting of Cyber-Physical and Embedded Systems, 2015.
        18. E. Senn, D. Blouin, and S. Turki, "AADL Requirements Annex Explored With FAA Handbook Example," 2012.
        19. F. Singhoff, J. Legrand, and L. Nana, "Scheduling and memory requirements analysis with AADL," Acm Sigada Ada Letters, vol. XXV, no. 4, pp. 1-10, 2005.
        20. Springfield, "Requirements Engineering Management Handbook."
        21. M. W. Whalen, A. Gacek, D. Cofer, A. Murugesan, M. P. E. Heimdahl, and S. Rayadurgam, "Your "What" Is My "How": Iteration and Hierarchy in System Design," IEEE Software, vol. 30, no. 2, pp. 54-60, 2013.
        22. Y. W. Zeng and M. L. Zhang, "An Approach about Translating from Requirement Model to AADL Software Architecture," in International Conference on Information NETWORKING and Automation, 2010, pp. V1-275-V1-279.


              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

              This site uses encryption for transmitting your passwords.