PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this article we investigate the problem of applying agile practices into safetycritical projects. The goal of our research is to investigate potential benefits from introducing agile practices into safety-critical environment and to present a solution providing for balancing agile approach with more disciplined assurance techniques, bringing the best of the two worlds together. In this article we present the supporting ideas such as assurance argument patterns along with a case study. The case study investigates how software engineers perceive risks associated with the introduction of agile practices and collect their ideas on how these risks could be mitigated.
Wydawca
Czasopismo
Rocznik
Strony
165--182
Opis fizyczny
Bibliogr. 35 poz., rys., tab.
Twórcy
autor
  • Gdańsk University of Technology, Department of Software Engineering, Faculty of Electronics, Telecommunications and Informatics
  • Gdańsk University of Technology, Department of Software Engineering, Faculty of Electronics, Telecommunications and Informatics
Bibliografia
  • [1] Agile manifesto. http://agilemanifesto.org.
  • [2] Agiletek. http://www.agiletek.com/.
  • [3] Animas one touch ping. insulin pump. http://www.animas.com/animas-insulin-pumps/onetouch-ping.
  • [4] Capability maturity model integration. http://www.sei.cmu.edu/cmmi.
  • [5] Designsafe tool. http://www.designsafe.com/.
  • [6] Earned value management. http://www.earnedvaluemanagement.com/.
  • [7] Extreme programming: A gentle introduction. http://www.extremeprogramming.org/.
  • [8] Moodle. http://moodle.org/.
  • [9] Nor-sta services portal. www.nor-sta.eu/en.
  • [10] Alleman G. B., Henderson M., Hill C. H. M., Seggelke R.: Making Agile DevelopmentWork in a Government Contracting Environment Measuring velocity with Earned Value. Proc. of the Agile Development Conference 2003, Salt Lake City, Utah, June 2003.
  • [11] Babuscio J.: How the FBI learned to catch bad guys one iteration at a time. In 2009 Agile Conference Proceedings, Chicago, USA, pp. 96–100. August 2009.
  • [12] Boehm B.: Get ready for agile methods, with care. IEEE Computer, 35, 2002.
  • [13] Boehm B., Turner R.: Balancing Agility and Discipline: A Guide for the Perplexed. Addison Wesley, 2003.
  • [14] Bulska K. M. J.: Łaczenie zwinnosci metodyki SCRUM z dojrzałoscia modelu CMMI. (Integration of the agile SCRUM practices with the maturity of CMMI). In National Conference of Software Engineering (KKIO), 2010.
  • [15] Diaz J., Garbajosa J., Calvo-Manzano J.: Mapping CMMI Level 2 to Scrum Practices: An Experience Report. Proc. EuroSPI 2009 Alcala, Spain, September 2009.
  • [16] Fritzsche M., Keil P.: Agile methods and CMMI: Compatibility or conflict?, vol 1(1). 2007.
  • [17] Ge X., Paige R., McDermid J.: An Iterative Approach for Development of Safety-Critical Software and Safety Arguments. IEEE, 2010. 180 Janusz Górski, Katarzyna Łukasiewicz
  • [18] Glazer H., Anderson D., Anderson D. J., Konrad M., Shrum S.: CMMI or Agile : Why Not Embrace Both ! Software Engineering Process Management. Technical Note for Software Engineering Institute.
  • [19] Górski J.: Trust Case — a case for trustworthiness of IT infrastructures. 196:125–142, 2005.
  • [20] Górski J.: Trust-IT – a framework for trust cases. Workshop on Assurance Casus for Security — The Metrics Challenge. Proc. of DSN 2007, June, 25-28:204–209, 2007.
  • [21] Górski J., Jarzebowicz A., Leszczyna R., Miler J., Olszewski M.: Trust case: Justifying trust. it solution. Reliability Engineering and System Safety, 89:33–47, 2005.
  • [22] Górski J., Łukasiewicz K.: Agile development of critical software, can it be justified? Proc. 7th ENASE Conference, Wroclaw, Poland, 2012.
  • [23] Lindvall M., Muthig D., Dagnino A., Wallin C., Stupperich M., Kiefer D., May J., Kahkonen T.: Agile software development in large organizations. Computer, 37(12):pp. 26–34, 2004.
  • [24] M. P., Mantyniemi A.: An Approach For Using CMMI in Agile Software Development Assessments: Experiences From Three Case Studies. Proc. of SPICE Conference, Luxembourg, May 2006.
  • [25] Marsal A., de Freitas B., Furtado Soares F., Furtado M., Maciel T., Melchior A.: Blending SCRUM practices and cmmi project management process areas. Innovations in Systems and Software Engineering, 4(1):17–29, 2008.
  • [26] P. F.: How can you be Agile in “Rough Terrain” and under “Tight Boundary Conditions”. Proc. 7th ENASE Conference, Wroclaw, Poland, 2012.
  • [27] Paige R., Charalambous R., Ge X., Brooke P.: Towards Agile Engineering of High- Integrity Systems. Proc. of 27th International Conference on Komputer Safety, Reliability and Security (SAFECOMP), September 2008.
  • [28] Petersen K., Wohlin C.: The effect of moving from a plan-driven to an incremental software development approach with agile practices. Empirical Software Engineering, 15(6):654–693, 2010.
  • [29] Poppendieck M.: Lean software development: an agile toolkit. Addison-Wesley, 2003.
  • [30] Potter N., Sakry M.: Implementing Scrum (Agile) and CMMI together. Process Group Post Newsletter, 16(2), January 2012.
  • [31] Rasmussen R., Hughes T., Jenks J. R., Skach J.: Adopting Agile in an FDA Regulated Environment. Agile Conference Proc. , Chicago, USA, August 2009.
  • [32] Rottier A., Rodrigues V.: Agile Development in a Medical Device Company. IEEE, 2008.
  • [33] Schwaber K., Beedle.: Agile Software Development with Scrum. Prentice Hall, 2001. Assessment of risks introduced to safety critical software (...) 181
  • [34] Stephenson Z., McDermid J., Ward A.: Health Modelling for Agility in Safety- Critical Systems Development. Proc. of the First IET International Conference on System Safety Engineering, June 2006.
  • [35] Weiguo L., Xiaomin F.: Software Development Practice for FDA-Compliant Medical Devices. Proc. of the 2009 International Joint Conference on Computational Sciences and Optimization, 2009.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-AGH1-0032-0055
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.