![]() |
![]() |
![]() |
|
![]() |
|||
SD 4.1-SW: SW Architecture Design |
SE4.1-SW - SW-Architektur entwerfen
![]() |
|
|
---|
From | Product | to | Methods | Tool Req. | Ext. Norms | |||
---|---|---|---|---|---|---|---|---|
Activity | State | Chapter | Title | Activity | State | |||
SD1 | accepted | All | User Requirements | - | - |
/ISO IEC 12207/
Devlp. Proc.: |
||
SD2 | accepted | All | System Architecture | - | - | |||
SD3 | accepted | All | Technical Requirements | - | - | |||
SD2 | being proc. | Existing | Interface Overview | SD4.2-SW SD5-SW CM4.3 |
submitted |
COM (2) MODIAG (2) SSM (2) |
SSD22 SSD23 SSD24 SSD29 SSD30 SSD31 |
|
SD3 | being proc. | Existing | Operational Information: User Manual Diagnosis Manual Operator Manual Other Application Information |
SD4.3-SW | being proc. | |||
- | - | All | Software Architecture | SD4.2-SW SD4.3-SW SD5-SW |
submitted |
ACC (7) COM (2) DVER (6) FS (5) IAM (2) MODIAG (2) ODT (8) PIM (3) PRODIAG (2) SSM (2) STM (4) STRD (8) |
SSD01 SSD03 SSD04 SSD20 SSD22 SSD23 SSD24 SSD25 SSD28 SSD29 SSD30 SSD31 |
+ "Chapter" are extra columns from the original printed version of GD 250
In general, SW Units consist of several processes or tasks that are running parallel or quasi-parallel. The aim is to structure a SW Unit under the aspects of necessary or feasible parallel processing. In this connection, the actual conditions of the operating and runtime system and also the requirements and limitations of the hardware and the programming language have to be taken into consideration. The Software Architecture contains a description of the process ensemble, including its structure, communication, synchronization and the representation of the dynamic sequence model.
A brief performance specification and the relevance with regard to security (criticality level, security-specific function, security-relevant function) must be made for each item (Process, SW Component, SW Module, Database) of the selected proposal.
The interfaces defined on the basis of the architectural decisions have to be identified in the Software Architecture and to be documented in the Interface Overview.
The complete coverage of the requirements by Processes, SW Components, SW Modules and Databases defined in the Software Architecture has to be proven.
Details for the Operational Information (User Manual, Diagnosis Manual, Operator Manual, Other Application Information) have to be generated on the basis of the Software Architecture.
It is necessary to find out if, and if yes, which IT security-specific or IT security-relevant portions (1) are created in other SW Components/SW Modules/Databases during the realization.
The interfaces between the IT security-relevant to the uncritical IT Security Portion must be minimized in every SW Unit. These interfaces in each SW Unit and between the individual SW Units have to be exactly defined.
These modularization decisions are influenced by:
Role | Participation | ||
---|---|---|---|
SW Developer | responsible
Technical Author |
cooperating |
|
Norm | Process | Chapter | Obs. |
---|---|---|---|
/ISO IEC 12207/ | Development Process | Software Architectural Design | (s. Part 3 - ISO 3.2.1) |
(2 ) The methods have to be applied in object-oriented developments.
(3 ) Method PIM is to be applied when the design contains several processes to be parallelly executed.
(4 ) Method STM is to be applied if complex situations have to be considered during the run of the function or the process.
(5 ) Method FS is to be applied in case of special requirements to correctness, e. g. based on very high criticality. According to [ITSEC], FS is required for the description of the formal security model with the evaluation level E4, for the preliminary design FS is required with the evaluation level E6.
(6 ) A formal specification on two different abstraction levels is required for the application of DVER. Because of the great effort, the most critical portions of a specification have to be selected for which the DVER has to be applied. According to [ITSEC], method DVER is required for the proof of the formal security model with the evaluation level E4, for the proof of consistency between security model and preliminary design DVER is required with the evaluation level E6.
(7 ) Method ACC must be applied according to [ITSEC].
(8 ) Method ODT is to be applied for a realtime-oriented development with parallel processes; otherwise method STRD has to be applied.
This page online
GDPA Online
Last Updated 07.Mar.2004 by
C. Freericks