{"id":452368,"date":"2024-10-20T09:23:59","date_gmt":"2024-10-20T09:23:59","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2851-2023\/"},"modified":"2024-10-26T17:30:16","modified_gmt":"2024-10-26T17:30:16","slug":"ieee-2851-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2851-2023\/","title":{"rendered":"IEEE 2851-2023"},"content":{"rendered":"

New IEEE Standard – Active. A dependability lifecycle of products with focus on interoperable activities related to functional safety and its interactions with reliability, security, operational safety and time determinism are defined in this standard. The standard also describes methods, description languages, data models, and database schema that have been identified as necessary or critical, to enable the exchange\/interoperability of data across all steps of the lifecycle encompassing activities executed at intellectual property (IP), system-on-chip (SoC), system and item levels, in a way that allows integration in different application domains such as automotive, industrial, medical and avionics safety critical systems.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nFront cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
17<\/td>\nContents <\/td>\n<\/tr>\n
19<\/td>\nList of Figures <\/td>\n<\/tr>\n
20<\/td>\nList of Tables <\/td>\n<\/tr>\n
21<\/td>\n1. Overview
1.1 Scope
1.2 Purpose
1.3 Word usage <\/td>\n<\/tr>\n
22<\/td>\n2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions <\/td>\n<\/tr>\n
24<\/td>\n3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
26<\/td>\n4. Dependability management
4.1 Objectives
4.2 Requirements and recommendations
4.2.1 Dependability management process
4.2.2 Product impact analysis\u2014ME, DB <\/td>\n<\/tr>\n
27<\/td>\n4.2.2.1 Product impact analysis\u2014ME
4.2.2.2 Product impact analysis\u2014DB
4.2.3 Development interface agreement (DIA)\u2014DL
4.2.4 Software tools\u2014ME, DB <\/td>\n<\/tr>\n
28<\/td>\n4.2.4.1 Software tools\u2014DB
4.2.4.2 Software tools\u2014ME
4.2.5 Monitoring of parameters for prognostics\u2014DB
4.2.6 Tailoring of dependability activities\u2014ME, DL, DB <\/td>\n<\/tr>\n
29<\/td>\n4.2.6.1 Tailoring of dependability activities\u2014ME
4.2.6.2 Tailoring of dependability activities\u2014DL
4.2.6.3 Tailoring of dependability activities\u2014DB
4.2.7 Dependability case\u2014DB
4.2.8 Confirmation reviews\u2014ME <\/td>\n<\/tr>\n
30<\/td>\n4.2.9 Dependability audit\u2014ME
4.2.10 Dependability assessment\u2014ME <\/td>\n<\/tr>\n
31<\/td>\n4.2.11 Release for production\u2014DB
5. Product definition
5.1 Objectives <\/td>\n<\/tr>\n
32<\/td>\n5.2 General
5.3 Inputs
5.4 Requirements and recommendations
5.4.1 User story, user feature, and addressable market
5.4.2 System\/life profile\u2014DL, DB <\/td>\n<\/tr>\n
33<\/td>\n5.4.2.1 System\/life profile\u2014DL
5.4.2.2 System\/life profile\u2014DB
5.4.3 Hardware\/software\/system triggering conditions\u2014DB
5.4.4 Operating situations and operating modes\u2014DL, ME
5.4.4.1 Operating situations and operating modes\u2014DL <\/td>\n<\/tr>\n
34<\/td>\n5.4.4.2 Operating situations and operating modes\u2014ME
5.4.5 Item interdependency\u2014DL
5.4.6 External measures for safety and security\u2014DL, DB
5.4.6.1 External measures for safety and security\u2014DL
5.4.6.2 External measures for safety and security\u2014DB <\/td>\n<\/tr>\n
35<\/td>\n5.4.7 System level considerations for enabling deterministic performance\u2014DB
5.4.8 Operating situations, operating modes, performance metrics, and dynamic conditions\u2014DB
5.4.9 Environment use\u2014DB <\/td>\n<\/tr>\n
36<\/td>\n6. Generic requirements elicitation process of dependability lifecycle
6.1 Objectives
6.2 General
6.3 Inputs
6.4 Requirements and recommendations
6.4.1 Safety requirements\u2014ME, DL <\/td>\n<\/tr>\n
37<\/td>\n6.4.1.1 Safety requirements\u2014ME
6.4.1.2 Safety requirements\u2014DL
6.4.2 Concept\u2014DL
6.4.3 Risk level\/ automotive safety integrity level (ASIL) alignment matrix\u2014ME <\/td>\n<\/tr>\n
38<\/td>\n6.4.4 Safety goal\u2014DL
6.4.5 Hazards and risks\u2014ME, DB
6.4.5.1 Hazards and risks\u2014ME
6.4.5.2 Hazards and risks\u2014DB
6.4.6 Impact assessment vs. requirements in case of reuse of element(s)\u2014ME, DL <\/td>\n<\/tr>\n
39<\/td>\n6.4.6.1 Impact assessment vs. requirements in case of reuse of element(s)\u2014ME
6.4.6.2 Impact assessment vs. requirements in case of reuse of element(s)\u2014DL
6.4.7 Threat and risk\u2014DL
6.4.8 Platform tuning for safety critical real time applications\u2014ME
6.4.9 Real time considerations for safety analysis\u2014ME <\/td>\n<\/tr>\n
40<\/td>\n6.4.10 Modeling of the radiation working environment\u2014ME
6.4.11 HW and SW requirements traceability\u2014DL
6.4.12 Ensuring deterministic performance for safety applications\u2014ME <\/td>\n<\/tr>\n
41<\/td>\n6.4.13 Common mode failures\u2014DB
6.4.14 Radiation testing requirements for safety analysis\u2014DB
6.4.15 Parameters for real time and safety metrics\u2014DB
6.4.16 Contention\/Shared resources of functional safety real time intersections\u2014DB <\/td>\n<\/tr>\n
42<\/td>\n6.4.17 System level considerations for enabling deterministic performance\u2014DB
7. Generic design of dependable architecture
7.1 Objectives
7.2 General <\/td>\n<\/tr>\n
43<\/td>\n7.3 Inputs
7.3.1 Prerequisites
7.4 Requirements and recommendations
7.4.1 Failure mode\u2014DL
7.4.2 Functional safety HW design\u2014DL
7.4.3 Cybersecurity software testing\u2014ME <\/td>\n<\/tr>\n
44<\/td>\n7.4.4 Software architectural design (SAD)\u2014ME, DL
7.4.4.1 Software architectural design (SAD)\u2014ME
7.4.4.2 Software architectural design (SAD)\u2014DL
7.4.5 Artificial intelligence (AI) software configuration and calibration\u2014ME, DL <\/td>\n<\/tr>\n
45<\/td>\n7.4.5.1 Artificial intelligence software configuration and calibration\u2014ME
7.4.5.2 Artificial intelligence software configuration and calibration\u2014DL
7.4.6 Safety mechanism and safety envelope\u2014DL
7.4.7 Automotive safety integrity level (ASIL) decomposition\u2014ME <\/td>\n<\/tr>\n
46<\/td>\n7.4.8 System architectural design\u2014DL
7.4.9 SW design\/algorithm impact analysis\u2014ME
7.4.10 Confidence in use of software tools evaluation\u2014ME, DL
7.4.10.1 Confidence in use of software tools evaluation\u2014ME <\/td>\n<\/tr>\n
47<\/td>\n7.4.10.2 Confidence in use of software tools evaluation\u2014DL
7.4.11 Criteria for coexistence of elements\u2014ME
7.4.12 Impact assessment vs. requirements in case of reuse of element(s)\u2014ME, DL
7.4.13 Threat and risk\u2014DL <\/td>\n<\/tr>\n
48<\/td>\n7.4.14 Software development environment\u2014DL
7.4.15 Model interoperability\u2014ME, DL
7.4.15.1 Model interoperability\u2014ME
7.4.15.2 Model interoperability\u2014DL
7.4.16 Platform tuning for safety critical real time applications\u2014ME <\/td>\n<\/tr>\n
49<\/td>\n7.4.17 Real time considerations for safety analysis\u2014ME
7.4.18 Modeling of the radiation working environment\u2014ME
7.4.19 Ensuring deterministic performance for safety applications\u2014ME
7.4.20 System level considerations for deterministic performance\u2014ME <\/td>\n<\/tr>\n
50<\/td>\n7.4.21 Module design, integration, and testing report\u2014DL
7.4.22 Dependent failure initiators (DFIs)\u2014DB
7.4.23 Interface behavior parameters\u2014DB <\/td>\n<\/tr>\n
51<\/td>\n7.4.24 Failure modes including foreseeable misuse and known specification gaps\u2014DB
7.4.25 Artificial intelligence training data\u2014DB
7.4.26 Failures sources\u2014DB <\/td>\n<\/tr>\n
52<\/td>\n7.4.27 Hardware metrics assumptions\u2014DB
7.4.28 Safety mechanisms\u2014DB
7.4.29 Software tools safety evaluation benchmarks\u2014DB <\/td>\n<\/tr>\n
53<\/td>\n7.4.30 Failure modes for software\u2014DB
7.4.31 System reliability-availability-and-serviceability (RAS) architecture capabilities\u2014DB
7.4.32 Monitoring of parameters for prognostics\u2014DB <\/td>\n<\/tr>\n
54<\/td>\n7.4.33 Systematic faults\u2014DB
7.4.34 Common mode failure\u2014DB
7.4.35 Key parameters to consider for tradeoffs between real-time and safety metrics\u2014DB
7.4.36 Contention\/shared resources of functional safety-real time intersections\u2014DB <\/td>\n<\/tr>\n
55<\/td>\n7.4.37 System level considerations for enabling deterministic performance\u2014DB
8. Software, hardware co-design and the interface to non-electrical\/electronic system (E\/E) technology
8.1 Objectives
8.2 General <\/td>\n<\/tr>\n
56<\/td>\n8.3 Inputs
8.3.1 Prerequisites
8.4 Requirements and recommendations
8.4.1 Hardware software interface\u2014DL <\/td>\n<\/tr>\n
57<\/td>\n8.4.2 Electrical\/electronic (E\/E) to non-electrical\/electronic interface\u2014DL
9. Implementation aspects
9.1 Objectives
9.2 General <\/td>\n<\/tr>\n
58<\/td>\n9.3 Inputs
9.3.1 Prerequisites
9.3.2 Further supporting information
9.4 Requirements and recommendations
9.4.1 Cybersecurity software testing\u2014ME
9.4.2 Artificial intelligence training\u2014ME, DB
9.4.3 Fault model for side channel threats (HW)\/fault extraction\/injection\u2014ME <\/td>\n<\/tr>\n
59<\/td>\n9.4.4 Software development environment\u2014DL
9.4.5 Coding guidelines\/code review\u2014ME
9.4.6 Module design, integration, and testing report\u2014DL <\/td>\n<\/tr>\n
60<\/td>\n10. Verification, integration, and analysis
10.1 Objectives
10.2 General
10.2.1 V-model for verification and analysis
10.3 Inputs
10.3.1 Prerequisites <\/td>\n<\/tr>\n
61<\/td>\n10.4 Requirements and recommendations
10.4.1 Failure modes and effects analysis (FMEA)\/failure modes effects and diagnostics analysis (FMEDA)\u2014ME, DL, DB
10.4.1.1 Failure modes effects and diagnostics analysis\u2014DL
10.4.1.2 Failure modes effects and diagnostics analysis\u2014ME <\/td>\n<\/tr>\n
62<\/td>\n10.4.1.3 Failure mode\u2014DB
10.4.1.4 Failure modes and effects analysis\u2014DB
10.4.2 Action priority (AP)\u2014ME
10.4.3 Fault tree analysis (FTA)\u2014ME, DB
10.4.3.1 Fault tree analysis\u2014ME <\/td>\n<\/tr>\n
63<\/td>\n10.4.3.2 Fault tree analysis\u2014DB
10.4.4 Dependent failure analysis (DFA)\u2014ME, DL, DB
10.4.4.1 Dependent failure analysis\u2014ME
10.4.4.2 Dependent failure analysis\u2014DL
10.4.4.3 Dependent failure analysis\u2014DB
10.4.5 Dependability manual\u2014DL <\/td>\n<\/tr>\n
64<\/td>\n10.4.6 Base failure rate (BFR)\u2014DL, DB
10.4.6.1 Base failure rate\u2014DL
10.4.6.2 Base failure rate\u2014DB
10.4.7 Functional interface analysis (FIA)\u2014ME <\/td>\n<\/tr>\n
65<\/td>\n10.4.8 Hardware random failures evaluation\u2014ME
10.4.9 Vulnerability factors modeling\u2014ME
10.4.10 Stochastic behavior analysis\u2014ME <\/td>\n<\/tr>\n
66<\/td>\n10.4.11 Systematic analysis\u2014ME
10.4.12 Operational situations and operating modes\u2014ME, DL
10.4.13 Requirement\u2019s traceability in verification, validation, and testing\u2014DL <\/td>\n<\/tr>\n
67<\/td>\n10.4.14 Safety mechanism verification\u2014DB
10.4.15 Safety mechanism integration database\u2014DB
10.4.16 AI System stimulus and safety performance indicator\u2014DB <\/td>\n<\/tr>\n
68<\/td>\n10.4.17 Systems theoretic process analysis (STPA)\u2014ME
10.4.18 Hazard analysis and risk assessment (HARA)\u2014ME, DB
10.4.19 Coexistence analysis\u2014ME <\/td>\n<\/tr>\n
69<\/td>\n10.4.20 Software components qualification\u2014ME
10.4.21 Cybersecurity software testing\u2014ME
10.4.22 Safety verification for safety goal violation\u2014DL, ME
10.4.22.1 Safety verification for safety goal violation\u2014ME <\/td>\n<\/tr>\n
70<\/td>\n10.4.22.2 Safety verification for safety goal violation\u2014DL
10.4.23 Fault model for side channel threats (HW)\/fault extraction\/injection\u2014ME
10.4.24 Best practice for system integration and testing of intended functionality\u2014ME
10.4.25 Freedom from interference (FFI)\u2014ME, DL
10.4.25.1 Freedom from interference\u2014ME <\/td>\n<\/tr>\n
71<\/td>\n10.4.25.2 Freedom from interference\u2014DL
10.4.26 Artificial intelligence safety validation\u2014ME
10.4.27 Use of formal methods to verify real time performance\u2014ME
10.4.28 Functional insufficiency of the intended functionality\u2014ME, DL
10.4.28.1 Functional Insufficiency of the intended functionality\u2014ME <\/td>\n<\/tr>\n
72<\/td>\n10.4.28.2 Functional insufficiency of the intended functionality\u2014DL
10.4.29 Collection, inferring, and standardization of failures sources\u2014ME
10.4.30 Common mode analysis (CMA)\u2014ME
10.4.31 Commercial off-the-shelf (COTS) safety analysis\u2014ME
10.4.32 Artificial intelligence system safety performance indicator\u2014ME <\/td>\n<\/tr>\n
73<\/td>\n10.4.33 Production verification of safety mechanisms\u2014ME
10.4.34 Methodology for the validation of vulnerability factors\u2014ME
10.4.35 Single event effects\u2014DL, DB <\/td>\n<\/tr>\n
74<\/td>\n10.4.35.1 Single event effects\u2014DL
10.4.35.2 Spectra of energetic particles\u2014DB
10.4.35.3 Single event effects\u2014DB
10.4.36 Software tools safety evaluation\u2014DB
10.4.37 Effects and software real time constraints\u2014DB <\/td>\n<\/tr>\n
75<\/td>\n11. Dependability validation of the system integrated into the overall product with regard to the feature behavior in the operational domain
11.1 Objectives
11.2 General
11.3 Inputs
11.3.1 Prerequisites
11.3.2 Further supporting information <\/td>\n<\/tr>\n
76<\/td>\n11.4 Requirements and recommendations
11.4.1 Dependability validation environment
11.4.2 Specification of dependability validation
11.4.3 Execution of dependability validation <\/td>\n<\/tr>\n
77<\/td>\n11.4.4 Evaluation
11.4.5 Safety requirements\u2014ME, DL
11.4.6 Safety requirements evaluation\u2014ME <\/td>\n<\/tr>\n
78<\/td>\n11.4.7 Artificial intelligence system safety performance indicator\u2014ME, DB
11.4.8 Artificial intelligence safety validation\u2014ME
11.4.9 Operational situations and operating modes\u2014ME, DL
11.4.10 Methodology for the validation of vulnerability factors\u2014ME <\/td>\n<\/tr>\n
79<\/td>\n11.4.11 System level considerations for deterministic performance\u2014ME
11.4.12 Assumptions of use\u2014DL
11.4.13 Safety diagnostic information\u2014DL <\/td>\n<\/tr>\n
80<\/td>\n11.4.14 Safety goal\u2014DL
11.4.15 System\/Component\/IP-Level hardware and software requirements traceability\u2014DL
11.4.16 Requirements traceability in verification, validation, and testing\u2014DL
11.4.17 Operational situations and modes, use environment, performance metrics, and dynamic conditions\u2014DB <\/td>\n<\/tr>\n
81<\/td>\n12. Post-release activities
12.1 Objectives
12.2 General
12.3 Inputs
12.3.1 Prerequisites <\/td>\n<\/tr>\n
82<\/td>\n12.4 Requirements and recommendations
12.4.1 Safety diagnostic information\u2014DL
12.4.2 Monitoring of parameters for prognostics\u2014DB
12.4.3 Identification, impact, and resolution of safety anomalies\u2014ME <\/td>\n<\/tr>\n
83<\/td>\n12.4.4 Artificial intelligence models update\u2014ME
12.4.5 Proven in use evaluation\u2014ME
13. Dependability evaluation
13.1 Objectives
13.2 General <\/td>\n<\/tr>\n
84<\/td>\n13.3 Requirements and recommendations
13.3.1 Safety requirements evaluation\u2014ME <\/td>\n<\/tr>\n
85<\/td>\n13.3.2 Safety assessment for software updates\u2014ME
13.3.3 Hardware elements evaluation\u2014ME, DL
13.3.3.1 Hardware elements evaluation\u2014ME
13.3.3.2 Hardware elements evaluation\u2014DL
13.3.4 Safety case\u2014DL <\/td>\n<\/tr>\n
86<\/td>\n13.3.5 Assessment for conflicts between safe and secure system reactions\u2014ME
13.3.6 Identification, impact, and resolution of safety anomalies\u2014ME
13.3.7 Tradeoff assessment for real time and safety metrics\u2014ME
13.3.8 Confirmation measures\u2014DL <\/td>\n<\/tr>\n
87<\/td>\nAnnex A (informative) Proposed safety security alignment flow
A.1 Overview
A.2 Alignment flow at item, system, and IP\/SoC levels <\/td>\n<\/tr>\n
89<\/td>\nA.3 Safety security alignment matrix <\/td>\n<\/tr>\n
90<\/td>\nA.3.1 Deliverables from each discipline for requirements alignment
A.3.1.1 Safety team
A.3.1.2 Security team
A.3.2 Example use case\u2014Power steering system <\/td>\n<\/tr>\n
92<\/td>\nAnnex B (informative) SIPOC analysis-based needs traceability
B.1 Objectives
B.2 General <\/td>\n<\/tr>\n
93<\/td>\nB.3 Inputs
B.3.1 Prerequisites
B.3.2 Further supporting information
B.4 Recommendations
B.5 Work products <\/td>\n<\/tr>\n
94<\/td>\nAnnex C (informative) Dependability clauses and requirements
C.1 Introduction
C.2 Generic E\/E system description <\/td>\n<\/tr>\n
97<\/td>\nC.3 Generic dependability lifecycle definition
C.3.1 Product lifecycle phases <\/td>\n<\/tr>\n
98<\/td>\nC.3.2 Development phase <\/td>\n<\/tr>\n
100<\/td>\nC.3.3 Dependable product development lifecycle <\/td>\n<\/tr>\n
102<\/td>\nC.3.3.1 Design and verification of design <\/td>\n<\/tr>\n
103<\/td>\nC.3.3.2 Integration and verification, and validation <\/td>\n<\/tr>\n
104<\/td>\nC.3.4 Focusing on functional safety engineering
C.3.4.1 Guaranteeing dependability by common rules on systematics
C.3.4.2 Dependability by balancing and arbitrating contradicting measures <\/td>\n<\/tr>\n
105<\/td>\nC.3.4.3 Affordable dependability
C.3.4.4 Conclusion <\/td>\n<\/tr>\n
106<\/td>\nC.3.5 Lifecycle phases beyond development
C.3.5.1 Production
C.3.5.2 Commissioning, service, and maintenance <\/td>\n<\/tr>\n
107<\/td>\nC.3.5.3 Operation
C.3.5.4 Decommissioning
C.4 Dependability management
C.4.1 Methodology and description language for dependability management <\/td>\n<\/tr>\n
110<\/td>\nC.4.2 Database (DB) for dependability management <\/td>\n<\/tr>\n
112<\/td>\nC.5 Product definition <\/td>\n<\/tr>\n
113<\/td>\nC.5.1 User story, user feature, and addressable market <\/td>\n<\/tr>\n
114<\/td>\nC.5.2 Methodology, description language, and database for user story, user feature, and the addressable market <\/td>\n<\/tr>\n
116<\/td>\nC.5.3 Overall system feature behavior in operational domain, system\/item definition addressing all dependability attributes
C.5.4 Methodology, description language, and database for operational domain, system\/item definition addressing all dependability attributes <\/td>\n<\/tr>\n
118<\/td>\nC.6 Generic requirements elicitation process of dependability lifecycle
C.6.1 General <\/td>\n<\/tr>\n
119<\/td>\nC.6.2 Methodological approach to requirement elicitation
C.6.2.1 Prerequisites for elicitation <\/td>\n<\/tr>\n
121<\/td>\nC.6.2.2 Flow compliant requirements <\/td>\n<\/tr>\n
122<\/td>\nC.6.2.3 Formal and informal aspects of requirements elicitation <\/td>\n<\/tr>\n
123<\/td>\nC.6.3 Identification of requirement types
C.6.3.1 Requirements for product development
C.6.3.2 Requirements for post release activities
C.6.3.3 Requirements for verification and validation <\/td>\n<\/tr>\n
124<\/td>\nC.6.4 Proposed data description language for requirements
C.6.4.1 Elaboration of the data description language
C.6.5 Methodology and description language for requirement elicitation <\/td>\n<\/tr>\n
129<\/td>\nC.6.6 Database for requirement elicitation <\/td>\n<\/tr>\n
130<\/td>\nC.7 Generic design of dependable architecture
C.7.1 Modeling languages <\/td>\n<\/tr>\n
131<\/td>\nC.7.2 Modeling technique
C.7.2.1 Modeling language premises and architectural views <\/td>\n<\/tr>\n
132<\/td>\nC.7.2.2 Description language <\/td>\n<\/tr>\n
134<\/td>\nC.7.3 Methodology, description language, and database for dependable architecture <\/td>\n<\/tr>\n
146<\/td>\nC.8 Software and hardware co-design and the interface to non-E\/E technology
C.8.1 Description language or SW, HW co-design <\/td>\n<\/tr>\n
147<\/td>\nC.9 Implementation aspects
C.9.1 Elements to be developed
C.9.2 Reusing existing elements
C.9.3 Methodology and description language of implementation aspects <\/td>\n<\/tr>\n
148<\/td>\nC.10 Verification, integration, and analysis
C.10.1 Introduction <\/td>\n<\/tr>\n
149<\/td>\nC.10.2 V-model for functional verification and analysis
C.10.2.1 Layering model <\/td>\n<\/tr>\n
150<\/td>\nC.10.3 Analysis activities
C.10.3.1 Hazard analysis and risk assessment (HARA)
C.10.3.2 Types of functional safety analysis supporting verification
C.10.3.2.1 Failure modes and effects analysis <\/td>\n<\/tr>\n
151<\/td>\nC.10.3.2.2 Failure modes effects and diagnostics analysis
C.10.3.2.3 Fault tree analysis (FTA)
C.10.3.2.4 Dependent failure analysis (DFA)
C.10.3.2.5 Coexistence analysis
C.10.3.2.6 Freedom from interference
C.10.3.2.7 Detailed FMEDA and safety mechanism verification <\/td>\n<\/tr>\n
152<\/td>\nC.10.3.3 Safety mechanism integration database <\/td>\n<\/tr>\n
153<\/td>\nC.10.3.4 Verification activities
C.10.3.4.1 Informal reviews
C.10.3.4.2 Formal reviews
C.10.3.4.3 Functional verification activities <\/td>\n<\/tr>\n
154<\/td>\nC.10.4 Methodology and description language for verification, integration, and analysis <\/td>\n<\/tr>\n
164<\/td>\nC.10.4.1. Database for verification, integration, and analysis <\/td>\n<\/tr>\n
168<\/td>\nC.11 Dependability validation of the system integrated into the overall product with regard to the feature behavior in OD
C.11.1 Methodology and description language for dependability validation <\/td>\n<\/tr>\n
170<\/td>\nC.12 Post-release activities
C.12.1 Methodology for post-release activities <\/td>\n<\/tr>\n
172<\/td>\nC.13 Dependability evaluation
C.13.1 General <\/td>\n<\/tr>\n
173<\/td>\nC.13.2 Method and description language
C.13.2.1 Systematic approach <\/td>\n<\/tr>\n
174<\/td>\nC.13.2.2 Procedure <\/td>\n<\/tr>\n
177<\/td>\nC.13.2.3 Description language
C.13.2.4 Database
C.13.3 Methodology and description language for dependability evaluation <\/td>\n<\/tr>\n
180<\/td>\nC.13.3.1 Database <\/td>\n<\/tr>\n
181<\/td>\nAnnex D (informative) Bibliography <\/td>\n<\/tr>\n
183<\/td>\nBack cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Functional Safety Data Format for Interoperability within the Dependability Lifecycle (Approved Draft)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2023<\/td>\n183<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":452377,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-452368","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/452368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/452377"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=452368"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=452368"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=452368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}