您现在的位置是:网站首页>行业标准核动力厂安全分析用计算机软件开发与应用(试行)
核动力厂安全分析用计算机软件开发与应用(试行)
简介
核动力厂安全分析用计算机软件开发与应用(试行)
目录 1 引言............................................................................................................................7 1.1 目的................................................................................................................7 1.2 范围................................................................................................................7 2 安全分析用计算机软件的范围及要求....................................................................7 2.1 安全分析用计算机软件的范围....................................................................7 2.2 评价模型的概念............................................................................................8 2.3 评价模型的类型............................................................................................8 3 评价模型开发与评估过程的方法..........................................................................10 3.1 方法概述......................................................................................................10 3.2 评价模型开发基本原则..............................................................................12 3.3 建立评价模型能力需求..............................................................................13 3.4 开发评估基准..............................................................................................16 3.5 开发评价模型..............................................................................................18 3.6 评估评价模型的适宜性..............................................................................21 3.7 适宜性评定..................................................................................................24 3.8 评价模型开发与评估过程的裁剪应用......................................................25 3.9 通用安全分析程序的特殊应用..................................................................26 4 安全分析用计算机软件开发的验证与确认..........................................................27 4.1 概述..............................................................................................................27 4.2 需求的验证和确认......................................................................................27 4.3 设计的验证和确认......................................................................................28 4.4 编码实现的验证和确认..............................................................................29 4.5 测试的验证和确认......................................................................................30 4.6 模型评估的验证和确认..............................................................................31 4.7 安装和检验的验证和确认..........................................................................31 4.8 运行的验证和确认......................................................................................32 4.9 维护的验证和确认......................................................................................32 5 安全分析用计算机软件开发的质量保证..............................................................33 5.1 质量保证大纲的要求..................................................................................33 5.2 文件控制......................................................................................................36 5.3 配置管理......................................................................................................36 5.4 工具评定......................................................................................................37 5.5 纠正措施......................................................................................................37 5.6 第三方评定..................................................................................................37 5.7 开发和评估过程的计划..............................................................................38 5.8 评价模型开发文件......................................................................................40 6 评价模型的应用......................................................................................................44 6.1 概述..............................................................................................................44 6.2 保守评价模型..............................................................................................44 6.3 最佳估算评价模型......................................................................................46 名词解释......................................................................................................................50 附件ⅠEMDAP 方法对 9 类安全分析程序的适用性说明...........................................54
核动力厂安全分析用计算机软件开发与应用(试行)
目录 1 引言............................................................................................................................7 1.1 目的................................................................................................................7 1.2 范围................................................................................................................7 2 安全分析用计算机软件的范围及要求....................................................................7 2.1 安全分析用计算机软件的范围....................................................................7 2.2 评价模型的概念............................................................................................8 2.3 评价模型的类型............................................................................................8 3 评价模型开发与评估过程的方法..........................................................................10 3.1 方法概述......................................................................................................10 3.2 评价模型开发基本原则..............................................................................12 3.3 建立评价模型能力需求..............................................................................13 3.4 开发评估基准..............................................................................................16 3.5 开发评价模型..............................................................................................18 3.6 评估评价模型的适宜性..............................................................................21 3.7 适宜性评定..................................................................................................24 3.8 评价模型开发与评估过程的裁剪应用......................................................25 3.9 通用安全分析程序的特殊应用..................................................................26 4 安全分析用计算机软件开发的验证与确认..........................................................27 4.1 概述..............................................................................................................27 4.2 需求的验证和确认......................................................................................27 4.3 设计的验证和确认......................................................................................28 4.4 编码实现的验证和确认..............................................................................29 4.5 测试的验证和确认......................................................................................30 4.6 模型评估的验证和确认..............................................................................31 4.7 安装和检验的验证和确认..........................................................................31 4.8 运行的验证和确认......................................................................................32 4.9 维护的验证和确认......................................................................................32 5 安全分析用计算机软件开发的质量保证..............................................................33 5.1 质量保证大纲的要求..................................................................................33 5.2 文件控制......................................................................................................36 5.3 配置管理......................................................................................................36 5.4 工具评定......................................................................................................37 5.5 纠正措施......................................................................................................37 5.6 第三方评定..................................................................................................37 5.7 开发和评估过程的计划..............................................................................38 5.8 评价模型开发文件......................................................................................40 6 评价模型的应用......................................................................................................44 6.1 概述..............................................................................................................44 6.2 保守评价模型..............................................................................................44 6.3 最佳估算评价模型......................................................................................46 名词解释......................................................................................................................50 附件ⅠEMDAP 方法对 9 类安全分析程序的适用性说明...........................................54
推荐下载
