Isabelle_DOF/ontologies/CENELEC_50126.thy

459 lines
19 KiB
Plaintext
Raw Normal View History

chapter \<open>An Outline of a CENELEC Ontology\<close>
text\<open> NOTE: An Ontology-Model of a certification standard such as CENELEC or Common Criteria
identifies:
- notions (conceptual \emph{categories}) having \emph{instances}
(similar to classes and objects),
- their subtype relation (eg., a "SRAC" is an "assumption"),
- their syntactical structure
(for the moment: defined by regular expressions describing the
order of category instances in the overall document as a regular language)
\<close>
2018-05-14 13:47:16 +00:00
(*<<*)
theory CENELEC_50126
imports "../Isa_COL"
begin
2018-05-14 13:47:16 +00:00
(*>>*)
text\<open> Excerpt of the BE EN 50128:2011, page 22. \<close>
section\<open>Terms and Definitions\<close>
subsection\<open>assessment\<close>
text\<open>process of analysis to determine whether software, which may include process, documentation,
system, subsystem hardware and/or software components, meets the specified requirements and to form
a judgement as to whether the software is fit for its intended purpose. Safety assessment is
focused on but not limited to the safety properties of a system.\<close>
subsection\<open>assessor\<close>
text\<open>entity that carries out an assessment\<close>
subsection\<open>commercial off-the-shelf (COTS) software\<close>
text\<open>software defined by market-driven need, commercially available and
whose fitness for purpose has been demonstrated by a broad spectrum of commercial
users\<close>
subsection\<open>component\<close>
text\<open>a constituent part of software which has well-defined interfaces and behaviour
with respect to the software architecture and design and fulfils the following
criteria:
\<^enum> it is designed according to “Components” (see Table A.20);
\<^enum> it covers a specific subset of software requirements;
\<^enum> it is clearly identified and has an independent version inside the
configuration management system or is a part of a collection of components
(e. g. subsystems) which have an independent version
\<close>
subsection\<open>configuration manager\<close>
text\<open>entity that is responsible for implementing and carrying out the processes
for the configuration management of documents, software and related tools including
\<^emph>\<open>change management\<close>\<close>
subsection\<open>customer\<close>
text\<open>entity which purchases a railway control and protection system including
the software\<close>
subsection\<open>designer\<close>
text\<open>entity that analyses and transforms specified requirements into acceptable design solutions
which have the required safety integrity level\<close>
subsection\<open>entity\<close>
text\<open>person, group or organisation who fulfils a role as defined in this European
Standard\<close>
subsection\<open>error, fault\<close>
text\<open>defect, mistake or inaccuracy which could result in failure or in a deviation
from the intended performance or behaviour\<close>
subsection\<open>failure\<close>
text\<open>unacceptable difference between required and observed performance\<close>
subsection\<open>fault tolerance\<close>
text\<open>built-in capability of a system to provide continued correct provision of service as specified,
in the presence of a limited number of hardware or software faults\<close>
subsection\<open>firmware\<close>
text\<open>software stored in read-only memory or in semi-permanent storage such as flash memory, in a
way that is functionally independent of applicative software\<close>
subsection\<open>generic software\<close>
text\<open>software which can be usedfor a variety of installations purely by the provision of
application-specific data and/or algorithms\<close>
subsection\<open>implementer\<close>
text\<open>entity that transforms specified designs into their physical realisation\<close>
subsection\<open>integration\<close>
text\<open>process of assembling software and/or hardware items, according to the architectural and
design specification, and testing the integrated unit
\<close>
subsection\<open>integrator\<close>
text\<open>entity that carries out software integration\<close>
subsection\<open>pre-existing software\<close>
text\<open>software developed prior to the application currently in question, including COTS (commercial
off-the shelf) and open source software\<close>
subsection\<open>open source software\<close>
text\<open>source code available to the general public with relaxed or non-existent copyright restrictions
\<close>
subsection\<open>programmable logic controller\<close>
text\<open>solid-state control system which has a user programmable memory for storage of instructions to
implement specific functions
\<close>
subsection\<open>project management\<close>
text\<open>administrative and/or technical conduct of a project, including safety aspects\<close>
subsection\<open>project manager\<close>
text\<open>entity that carries out project management\<close>
subsection\<open>reliability\<close>
text\<open>ability of an item to perform a required function under given conditions for a given period of
time\<close>
subsection\<open>robustness\<close>
text\<open>ability of an item to detect and handle abnormal situations\<close>
subsection\<open>requirements manager\<close>
text\<open>entity that carries out requirements management\<close>
subsection\<open>requirements management\<close>
text\<open>the process of eliciting, documenting, analysing, prioritising and agreeing on requirements and
then controlling change and communicating to relevant stakeholders. It is a continuous process
throughout a project
\<close>
subsection\<open>risk\<close>
text\<open>combination of the rate of occurrence of accidents and incidents resulting in harm (caused by
a hazard) and the degree of severity of that harm
\<close>
subsection\<open>safety\<close>
text\<open>freedom from unacceptable levels of risk of harm to people\<close>
subsection\<open>safety authority\<close>
text\<open>body responsible for certifying that safety related software or services comply with relevant
statutory safety requirements\<close>
subsection\<open>safety function\<close>
text\<open>a function that implements a part or whole of a safety requirement\<close>
subsection\<open>safety-related software\<close>
text\<open>software which performs safety functions\<close>
subsection\<open>software\<close>
text\<open>intellectual creation comprising the programs, procedures, rules, data and any associated
documentation pertaining to the operation of a system\<close>
subsection\<open>software baseline\<close>
text\<open>complete and consistent set of source code, executable files, configuration files,
installation scripts and documentation that are needed for a software release. Information about
compilers, operating systems, preexisting software and dependent tools is stored as part of the
baseline. This will enable the organisation to software deployment
transferring, installing and activating a deliverable software baseline that has already been
released and assessed
\<close>
subsection\<open>software life-cycle\<close>
text\<open>those activities occurring during a period of time that starts when
software is conceived and ends when the software is no longer available for use. The software life
cycle typically includes a requirements phase, design phase,test phase, integration phase,
deployment phase and a maintenance phase 3.1.35 software maintainability
capability of the software to be modified; to correct faults, improve to a different environment
\<close>
subsection\<open>software maintenance\<close>
text\<open> action, or set of actions, carried out on software after deployment functionality
performance or other attributes, or adapt it with the aim of enhancing or correcting its
\<close>
subsection\<open>software safety integrity level\<close>
text\<open>classification number which determines the techniques and measures that have to be applied to
software NOTE Safety-related software has been classified into five safety integrity levels, where
0 is the lowest and 4 the highest.
\<close>
subsection\<open>supplier\<close>
text\<open>entity that designs and builds a railway control and protection system including the software
or parts thereof\<close>
subsection\<open>system safety integrity level\<close>
text\<open> classification number which indicates the required degree of confidence that an integrated
system comprising hardware and software will meet its specified safety requirements
\<close>
subsection\<open>tester\<close>
text\<open>an entity that carries out testing
\<close>
subsection\<open>testing\<close>
text\<open>process of executing software under controlled conditions as to ascertain its behaviour and
performance comparedto the corresponding requirements specification
\<close>
subsection\<open>tool class T1\<close>
text\<open>generates no outputs which candirectly or indirectly contribute to the executable code
(including data) of the software NOTE 11 examples include: a text editor or a requirement or
design support tool with no automatic code generation capabilities; configuration control tools.
\<close>
subsection\<open>tool class T2\<close>
text\<open>supports the test or verification of the design or executable code, where errors in the tool
can fail to reveal defects but cannot directly create errors in the executable software
NOTE T2 examples include: a test harness generator; a test coverage measurement tool; a static
analysis tool. reproduce defined versions and be the input for future releases at enhancements or
at upgrade in the maintenance phase
\<close>
subsection\<open>tool class T3\<close>
text\<open>generates outputs which can directly or indirectly contribute to the executable code
(including data) of the safety related system NOTE T3 examples include: a source code compiler,
a data/algorithms compiler, a tool to change set-points during system operation; an optimising
compiler where the relationship between the source code program and the generated object code is
not obvious; a compiler that incorporates an executable run-time package into the executable code.
\<close>
subsection\<open>traceability\<close>
text\<open>degree to which relationship can be established between two or more products of a development
process, especially those having a predecessor/successor or master/subordinate relationship to one
another
\<close>
subsection\<open>validation\<close>
text\<open>process of analysis followed by a judgment based on evidence to
documentation, software or application) fits the user needs,in particular with respect to safety
and quality and determine whether an item (e.g. process, with emphasis on the suitability of its
operation in accordance to its purpose in its intended environment
\<close>
subsection\<open>validator\<close>
text\<open>entity that is responsible for the validation
\<close>
subsection\<open>verification\<close>
text\<open>process of examination followed by a judgment based on evidence that output items (process,
documentation, software or application) of a specific development phase fulfils the requirements of
that phase with respect to completeness, correctness and consistency.
NOTE Verification is mostly based on document reviews (design, implementation, test documents etc.).
\<close>
subsection\<open>verifier\<close>
text\<open>entity that is responsible for one or more verification activities
\<close>
datatype role = PM (* Program Manager *)
| RQM (* Requirements Manager *)
| DES (* Designer *)
| IMP (* Implementer *)
| ASR (* Assessor *)
| Ne (* Integrator *)
| TST (* Tester *)
| VER (* Verifier *)
| VAL (* Validator *)
datatype phase = SR (* Software Requirement *)
| SA (* Software Architecture *)
| SDES (* Software Design *)
| SCDES (* Software Component Design *)
| CInT (* Component Implementation and Testing *)
| SI (* Software Integration *)
| SV (* Software Validation *)
| SD (* Software Deployment *)
| SM (* Software Maintenance *)
abbreviation software_requirement :: "phase" where "software_requirement \<equiv> SR"
abbreviation software_architecture :: "phase" where "software_architecture \<equiv> SA"
abbreviation software_design :: "phase" where "software_design \<equiv> SD"
abbreviation software_component_design:: "phase" where "software_component_design \<equiv> SCDES"
abbreviation component_implementation_and_testing :: "phase"
where "component_implementation_and_testing \<equiv> CInT"
abbreviation software_integration :: "phase" where "software_integration \<equiv> SI"
abbreviation software_validation :: "phase" where "software_validation \<equiv> SV"
abbreviation software_deployment :: "phase" where "software_deployment \<equiv> SD"
abbreviation software_maintenance :: "phase" where "software_maintenance \<equiv> SM"
term "SR"
doc_class objectives =
long_name :: "string option"
is_concerned :: "role set"
section\<open> Requirements-Analysis related Categories \<close>
doc_class requirement =
long_name :: "string option"
is_concerned :: "role set"
doc_class requirement_analysis =
no :: "nat"
accepts "\<lbrace>requirement\<rbrace>\<^sup>+"
text\<open>The category @{emph \<open>hypothesis\<close>} is used for assumptions from the
foundational mathematical or physical domain, so for example:
\<^item> the Mordell-Lang conjecture holds,
\<^item> euklidian geometry is assumed, or
\<^item> Newtonian (non-relativistic) physics is assumed,
Their acceptance is inherently outside the scope of the model
and can only established inside certification process by
authority argument.
\<close>
datatype hyp_type = physical | mathematical | computational | other
typ "CENELEC_50126.requirement"
doc_class hypothesis = requirement +
hyp_type :: hyp_type <= physical (* default *)
2019-01-08 09:34:49 +00:00
text\<open> The following sub-class of security related hypothesis might comprise, for example:
2019-01-08 09:34:49 +00:00
\<^item> @{term "P \<noteq> NP"},
\<^item> or the computational hardness of certain functions
relevant for cryptography (like prime-factorization).\<close>
2019-01-08 09:34:49 +00:00
doc_class security_hyp = hypothesis +
hyp_type :: hyp_type <= physical (* default *)
text\<open>The category \<^emph>\<open>assumption\<close> is used for domain-specific assumptions. It has formal, semi-formal
and informal sub-categories. They have to be tracked and discharged by appropriate
validation procedures within a certification process, by it by test or proof. \<close>
datatype ass_kind = informal | semiformal | formal
doc_class assumption = requirement +
assumption_kind :: ass_kind <= informal
text\<open> The category \<^emph>\<open>exported constraint\<close> (or \<^emph>\<open>ec\<close> for short) is used for formal assumptions, ... \<close>
doc_class ec = assumption +
assumption_kind :: ass_kind <= (*default *) formal
text\<open> The category \<^emph>\<open>safety related application condition\<close> (or \<^emph>\<open>srac\<close> for short) is used ... \<close>
doc_class srac = ec +
assumption_kind :: ass_kind <= (*default *) formal
2019-01-08 09:34:49 +00:00
doc_class timing = ec +
assumption_kind :: ass_kind <= (*default *) formal
doc_class energy = ec +
assumption_kind :: ass_kind <= (*default *) formal
doc_class security = ec +
assumption_kind :: ass_kind <= (*default *) formal
section\<open> Design related Categories \<close>
doc_class design_item =
description :: string
datatype design_kind = unit | module | protocol
doc_class interface = design_item +
kind :: design_kind
section\<open> Requirements-Analysis related Categories \<close>
doc_class test_item =
nn :: "string option"
text{* subcategories are : *}
datatype test_kind = blackbox | whitebox | greybox | fuzz | pertubation
datatype test_coverage_criterion =
allpathk nat nat (* depth, test_coverage_degree *)
| mcdc nat (* depth, test_coverage_degree *)
| exhaustive
| dnf_E_d string nat (* equivalence class testing *)
| other string
doc_class test_specification = test_item +
short_goal :: string
doc_class test_case = test_item +
kind :: test_kind
descr :: string
doc_class test_result = test_item +
verdict :: bool
remarks :: string
covvrit :: test_coverage_criterion
datatype test_environment_kind = hardware_in_the_loop ("hil")
| simulated_hardware_in_the_loop ("shil")
doc_class test_environment = test_item +
descr :: string
kind :: test_environment_kind <= shil
doc_class test_tool = test_item +
descr :: string
doc_class test_requirement = test_item +
descr :: string
doc_class test_adm_role = test_item +
name :: string
doc_class test_documentation =
no :: "nat"
accepts "test_specification ~~ \<lbrace>test_case~~test_result\<rbrace>\<^sup>+ ~~ \<lbrace>test_environment||test_tool\<rbrace>\<^sup>+ ~~
\<lbrakk>test_requirement\<rbrakk> ~~ test_adm_role"
accepts " test_specification ~~ \<lbrace>test_case~~test_result\<rbrace>\<^sup>+ ~~ \<lbrace>test_environment||test_tool\<rbrace>\<^sup>+ ~~
\<lbrakk>test_requirement \<rbrakk> ~~ test_adm_role"
section\<open> Testing and Validation \<close>
ML\<open>
DOF_core.name2doc_class_name @{theory} "requirement";
DOF_core.name2doc_class_name @{theory} "srac";
DOF_core.is_defined_cid_global "srac" @{theory};
DOF_core.is_defined_cid_global "ec" @{theory};
"XXXXXXXXXXXXXXXXX";
DOF_core.is_subclass @{context} "CENELEC_50126.ec" "CENELEC_50126.ec";
DOF_core.is_subclass @{context} "CENELEC_50126.srac" "CENELEC_50126.ec";
DOF_core.is_subclass @{context} "CENELEC_50126.ec" "CENELEC_50126.srac";
DOF_core.is_subclass @{context} "CENELEC_50126.ec" "CENELEC_50126.test_requirement";
"XXXXXXXXXXXXXXXXX";
val {docobj_tab={maxano, tab=ref_tab},docclass_tab=class_tab,...} = DOF_core.get_data @{context};
Symtab.dest ref_tab;
Symtab.dest class_tab;
\<close>
ML\<open>
"XXXXXXXXXXXXXXXXX";
DOF_core.get_attributes_local "srac" @{context};
@{term assumption_kind}
\<close>
2019-02-04 13:16:09 +00:00
sdgfdsf
text\<open>dfgdfg\<close>
ML\<open>
DOF_core.name2doc_class_name @{theory} "requirement";
Syntax.parse_typ @{context} "requirement";
val Type(t,_) = Syntax.parse_typ @{context} "requirement" handle ERROR _ => dummyT;
Syntax.read_typ @{context} "hypothesis" handle _ => dummyT;
Proof_Context.init_global;
\<close>
end