2018
DOI: 10.1111/risa.12972
|View full text |Cite
|
Sign up to set email alerts
|

Toward an Application Guide for Safety Integrity Level Allocation in Railway Systems

Abstract: The work in the article presents the development of an application guide based on feedback and comments stemming from various railway actors on their practices of SIL allocation to railway safety-related functions. The initial generic methodology for SIL allocation has been updated to be applied to railway rolling stock safety-related functions in order to solve the SIL concept application issues. Various actors dealing with railway SIL allocation problems are the intended target of the methodology; its princi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Recently, more and more attention has been paid to risk and safety assessment [14][15][16]. In rail transport, there are many documents that talk about the need to analyze and monitor risk; documents explaining the legal requirements, in particular, in terms of Regulation 402/2013 on the Common Risk Assessment Methodology [17][18][19]; and articles demonstrating the application of the FMEA method [20][21][22] or bowtie method [23] and showing the allocation of safety integrity levels [24,25]. But these documents do not specify the procedure and do not define the methods that should be used to analyze a given risk.…”
Section: Requirements Related To Risk Analysis In Investment Processesmentioning
confidence: 99%
“…Recently, more and more attention has been paid to risk and safety assessment [14][15][16]. In rail transport, there are many documents that talk about the need to analyze and monitor risk; documents explaining the legal requirements, in particular, in terms of Regulation 402/2013 on the Common Risk Assessment Methodology [17][18][19]; and articles demonstrating the application of the FMEA method [20][21][22] or bowtie method [23] and showing the allocation of safety integrity levels [24,25]. But these documents do not specify the procedure and do not define the methods that should be used to analyze a given risk.…”
Section: Requirements Related To Risk Analysis In Investment Processesmentioning
confidence: 99%
“…Generally, such standards are developed to provide a generic method of identification, classification, mitigation of hazards, and guide contingency protocols (e.g., safety case). Embedded within these standards are a number of risk assessment methods that aim to either amalgamate two or more dimensions of risk into a single index measure of risk (e.g., risk matrices and safety integrity levels [56]), or specify the consequences of a given event (e.g., fault tree analysis and failure mode and effects analysis). Certainly, many of these standards are applicable and valuable to the mitigation of any vulnerability generated in the design process.…”
Section: G Vulnerability Exposure and Riskmentioning
confidence: 99%
“…High criticality tasks behavior: Each individual HC task starts at mode LO and can change its mode independently from the rest of tasks. By default, on the release of a new period the HC task runs LO mode and whenever C l overrun 2 The system pattern is then updated accordingly, P = Shrinking. 3 P = Regular.…”
Section: A System Modelmentioning
confidence: 99%
“…Whenever the system scheduling mode is back to Normal and the current stretched periods expire, the stretching is interrupted and the LC tasks can then execute regularly. To amortize the slack time created by stretching, the scheduler applies a shrinking to LC task periods 2 . The shrinking pace depends on the system workload and the LC task periods length.…”
Section: Definition Iii1 (Tasks)mentioning
confidence: 99%
See 1 more Smart Citation