核动力厂安全分析用计算机软件开发与应用(试行)
目录
1 引言............................................................................................................................7
1.1 目的................................................................................................................7
1.2 范围................................................................................................................7
2 安全分析用计算机软件的范围及要求....................................................................7
2.1 安全分析用计算机软件的范围....................................................................7
2.2 评价模型的概念............................................................................................8
2.3 评价模型的类型............................................................................................8
3 评价模型开发与评估过程的方法..........................................................................10
3.1 方法概述......................................................................................................10
3.2 评价模型开发基本原则..............................................................................12
3.3 建立评价模型能力需求..............................................................................13
3.4 开发评估基准..............................................................................................16
3.5 开发评价模型..............................................................................................18
3.6 评估评价模型的适宜性..............................................................................21
3.7 适宜性评定..................................................................................................24
3.8 评价模型开发与评估过程的裁剪应用......................................................25
3.9 通用安全分析程序的特殊应用..................................................................26
4 安全分析用计算机软件开发的验证与确认..........................................................27
4.1 概述..............................................................................................................27
4.2 需求的验证和确认......................................................................................27
4.3 设计的验证和确认......................................................................................28
4.4 编码实现的验证和确认..............................................................................29
4.5 测试的验证和确认......................................................................................30
4.6 模型评估的验证和确认..............................................................................31
4.7 安装和检验的验证和确认..........................................................................31
4.8 运行的验证和确认......................................................................................32
4.9 维护的验证和确认......................................................................................32
5 安全分析用计算机软件开发的质量保证..............................................................33
5.1 质量保证大纲的要求..................................................................................33
5.2 文件控制......................................................................................................36
5.3 配置管理......................................................................................................36
5.4 工具评定......................................................................................................37
5.5 纠正措施......................................................................................................37
5.6 第三方评定..................................................................................................37
5.7 开发和评估过程的计划..............................................................................38
5.8 评价模型开发文件......................................................................................40
6 评价模型的应用......................................................................................................44
6.1 概述..............................................................................................................44
6.2 保守评价模型..............................................................................................44
6.3 最佳估算评价模型......................................................................................46
名词解释......................................................................................................................50
附件ⅠEMDAP 方法对 9 类安全分析程序的适用性说明...........................................54