Methodology for Certification-Compliant Effect-Chain Modeling

نویسندگان

چکیده

The success of engineering complex technical systems is determined by meeting customer requirements and institutional regulations. One example relevant to the automobile industry United Nations Economic Commission Europe (UN ECE), which specifies homologation series requires proof traceability. required traceability can be achieved modeling system artifacts their relations in a consistent, seamless model—an effect-chain model. Currently, no in-depth methodology exists support engineers developing certification-compliant models. For this purpose, new for was developed, includes extensions an existing method, suitable models, tools process. evaluation purposes, applicability proven based on experience more than 300 workshops at automotive OEM supplier. following case chosen demonstrate applicability: development window lifter that has meet demands UN ECE Regulations R156 R21. Results indicate multiple benefits supporting with effect chains. Three are goal-oriented reduce necessary capacity, increasing model quality applying information criteria, potential costs through automatable analyses changes. Further, companies other industries will benefit from increased capabilities used architecture comply regulations such as ASPICE or ISO 26262.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Certification of Esra-compliant Software Defined Radios

section: 6.6 Waveform Portability, 17.1 SDR Performance Certification and Accreditation

متن کامل

Automated Certification for Compliant Cloud-based Business Processes

Cloud Computing workflows need to adhere to a variety of rules and offer high flexibility. This is at odds with the compliance certification currently being carried out in a manual fashion. The paper presents Comcert, an approach for the automated analysis of workflows. If a workflow does not adhere to the given rules, re-usable rule patterns are used to pinpoint the workflow vulnerabilities. T...

متن کامل

Towarda Comprehensive Infosec Certification Methodology

Accreditors want to know what vulnerabilities will exist if they decide to turn on a system. TCSEC evaluations address products, not systems. Not only the hardware and software of a system are of concern; the accreditor needs to view these components in relation to the environment in which they operate and in relation to the system’s mission and the threats to it. This paper proposes an informa...

متن کامل

Towards an ISO-9000 compliant certification service provider

In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference model, to which the CSPs will conform, towards the full compliance to the ISO-9000 quality standards. There are two dimensions of quality in respect of a CSP: The first quality dimension regards the value added securit...

متن کامل

Customer involvement in greening the supply chain: an interpretive structural modeling methodology

The role of customers in green supply chain management needs to be identified and recognized as an important research area. This paper is an attempt to explore the involvement aspect of customers towards greening of the supply chain (SC). An empirical research approach has been used to collect primary data to rank different variables for effective customer involvement in green concept implement...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Systems

سال: 2023

ISSN: ['2079-8954']

DOI: https://doi.org/10.3390/systems11030154