Conference Paper

A unified approach to failure mode, effects and criticality analysis (FMECA)

US DOE, Washington, DC
DOI: 10.1109/ARMS.1991.154445 Conference: Reliability and Maintainability Symposium, 1991. Proceedings., Annual
Source: IEEE Xplore

ABSTRACT A unified approach in performing a failure mode, effects and
criticality analysis (FMECA) is described. This procedure provides a
technique for performing a thorough analysis that can identify
engineering problem areas and failure modes at specific plant levels,
and contribute to the validity of design review process. It provides
formats for documenting plant/equipment operating characteristics so
that failure modes can readily be identified with a functional
characteristic. In addition, it gives an analytical technique that can
identify necessary corrective action with which top management can make
critical decisions

  • [Show abstract] [Hide abstract]
    ABSTRACT: Although awareness is constantly rising, that industrial computer networks (in a very broad sense) can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to protect general-purpose computer networks, can be effectively adopted also in those situations where a physical system is managed/controlled through some distributed Information and Communication Technology (ICT) infrastructure. Unfortunately, this is not the case, as several examples of successful attacks carried out in the last decade, and more frequently in the very recent past, have dramatically shown. Experts in this area know very well that often the peculiarities of industrial networks prevent the adoption of classical approaches to their security and, in particular, of those popular solutions that are mainly based on a detect and patch philosophy. This paper is a contribution, from the security point of view, to the assessment of the current situation of a wide class of industrial distributed computing systems. In particular, the analysis presented in this paper takes into account the process of ensuring a satisfactory degree of security for a distributed industrial system, with respect to some key elements such as the system characteristics, the current state of the art of standardization and the adoption of suitable controls (countermeasures) that can help in lowering the security risks below a predefined, acceptable threshold.
    IEEE Transactions on Industrial Informatics 02/2013; 9(1):277-293. DOI:10.1109/TII.2012.2198666 · 8.79 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Presents a new qualitative fault tree evaluation algorithm based on bit manipulation techniques for the identification of the largest independent sub-trees and the subsequent determination of all minimal cut sets of large and complex fault trees. The methodology developed is validated by direct application to a complex fault tree taken from the literature. Results obtained are compared with those available in the literature. Shows that the use of the algorithm (FTABMT) developed results in significant savings in both computer time and storage requirements.
    International Journal of Quality &amp Reliability Management 02/1996; 13(2):114-132. DOI:10.1108/02656719610110069
  • Transactions of the Korean Society of Mechanical Engineers B 06/2007; 31(6):522-530. DOI:10.3795/KSME-B.2007.31.6.522