Filters








87,388 Hits in 7.6 sec

Security Assurance Cases – State of the Art of an Emerging Approach [article]

Mazen Mohamad and Jan-Philipp Steghöfer and Riccardo Scandariato
2020 arXiv   pre-print
Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system.  ...  Our results indicate that, while there are numerous papers discussing the importance of security assurance cases and their usage scenarios, the literature is still immature with respect to concrete support  ...  Creators Academic authors Industrial authors 3rd party experts Validators Academic authors Industrial authors 3rd party experts Acknowledgements This work is partially supported by the CASUS research  ... 
arXiv:2003.14151v1 fatcat:czh7tt6ufncw7dxice2p5mvgby

Security assurance cases—state of the art of an emerging approach

Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato
2021 Empirical Software Engineering  
AbstractSecurity Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system.  ...  After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing  ...  Funding Open access funding provided by University of Gothenburg.  ... 
doi:10.1007/s10664-021-09971-7 fatcat:sxa6pbmpbjdrhbqmiyl25okkzq

Security assurance cases - state of the art of an emerging approach

Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato, TUHH Universitätsbibliothek
2021
Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system.  ...  After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing  ...  Funding Open access funding provided by University of Gothenburg.  ... 
doi:10.15480/882.3663 fatcat:3ea2reokabcoxn4l3tsc2io2om

Security Assurance Cases for Road Vehicles: an Industry Perspective [article]

Mazen Mohamad and Alexander Åström and Örjan Askerdal and Jörgen Borg and Riccardo Scandariato
2020 arXiv   pre-print
While the industry is faced with the challenge of defining a sound methodology to build security assurance cases, the state of the art is rather immature.  ...  Therefore, we have conducted a thorough investigation of the (external) constraints and (internal) needs that security assurance cases have to satisfy in the context of the automotive industry.  ...  for security assurance cases in an automotive organization.  ... 
arXiv:2003.14106v1 fatcat:5plgpyrdwzhete7akaqfeltzli

Towards understanding the DO-178C / ED-12C assurance case

C.M. Holloway
2012 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012   unpublished
This paper describes initial work towards building an explicit assurance case for DO-178C / ED-12C.  ...  Two specific questions are explored: (1) What are some of the assumptions upon which the guidance in the document relies, and (2) What claims are made concerning test coverage analysis?  ...  Claims, arguments, and evidence constitute the three necessary components of an assurance case.  ... 
doi:10.1049/cp.2012.1499 fatcat:qq5ab7tmozbgviklcx4ppb5gae

The multi-agent systems for computer network security assurance: frameworks and case studies

V. Gorodetski, I. Kotenko
Proceedings 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS 2002)  
of computer network security assurance.  ...  The paper sketches the above MASs and analyses advantages of use of multi-agent architecture for computer network assurance.  ...  The design and implementation of all three multi-agent case studies for network security assurance is being carried out on the basis of MASDK.  ... 
doi:10.1109/icais.2002.1048117 fatcat:5awljqscgfahre5svzwk2vvk7a

Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach [chapter]

Ali Hessami, Nicos Karcanias
2010 Communications in Computer and Information Science  
The emergent behavioural aspects are explored and we develop a systems framework for assurance based on an Assessment and Management paradigm each comprising a number of principles and processes.  ...  The paper develops a framework of seven fundamental facets of performance as an ontology for emergent behavioural properties and a separate framework for the emergent structural properties of complex systems  ...  We further endeavour to develop the case for a unified approach to emergence, assessment and management of emergent properties in complex products, processes, systems and undertakings.  ... 
doi:10.1007/978-3-642-15717-2_22 fatcat:trki4lbjkvefdn6ovkn5vrchpa

Complexity, emergence and the challenges of assurance the need for a systems paradigm

A. G. Hessami, N. Karcanias
2009 2009 3rd Annual IEEE Systems Conference  
The emergent behavioural aspects are explored and we develop a systems framework for assurance based on an Assessment and Management paradigm each comprising a number of principles and processes.  ...  The paper develops a framework of seven fundamental facets of performance as an ontology for emergent behavioural properties and a separate framework for the emergent structural properties of complex systems  ...  An illustrative case involves the marketing of cosmetics containing nano-particles [10] .  ... 
doi:10.1109/systems.2009.4815779 fatcat:ptzzkhmklrdwnfbgcpp52nvwze

Complexity, emergence and the challenges of assurance

A G Hessami, N Karcanias
2011 IEEE Aerospace and Electronic Systems Magazine  
The emergent behavioural aspects are explored and we develop a systems framework for assurance based on an Assessment and Management paradigm each comprising a number of principles and processes.  ...  The paper develops a framework of seven fundamental facets of performance as an ontology for emergent behavioural properties and a separate framework for the emergent structural properties of complex systems  ...  An illustrative case involves the marketing of cosmetics containing nano-particles [10] .  ... 
doi:10.1109/maes.2011.5739488 fatcat:hybhnsxkvvhutdjymkjbcuxski

Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain

Debasis Gountia
2019 EAI Endorsed Transactions on Security and Safety  
But then also we have to pertain to the scalability and security challenges in this technology for more honorable and reliable in state-of-the-art Blockchain technology.  ...  Blockchain technology is an excellent example of maintaining privacy and security (in terms of immutability).  ...  Introduction Among recently technological advances, Blockchain technology is an emerging new approach in the domain of information technologies.  ... 
doi:10.4108/eai.8-4-2019.157416 fatcat:7z6rw4uxxvbzpivgol5mjevuia

European Court of Human Rights: An absolute ban on deportation of foreign citizens to countries where torture or ill-treatment is a genuine risk

G. Gentili
2010 International Journal of Constitutional Law  
The changed circumstances called for a new approach that would first weigh, on a case-by-case basis, the risk faced by a deportee (article 3 protection) against a state's interest in national security  ...  The door is thus closed to any possible instance of torture. The ECtHR also rejects a formalist approach in evaluating the persuasiveness of the diplomatic assurances provided by receiving states.  ... 
doi:10.1093/icon/moq001 fatcat:cuo7xhcvtrbljoqdqqmrsewrrm

Digital privacy: theory, policies and technologies

Annie I. Anton, Travis D. Breaux, Stefanos Gritzalis, John Mylopoulos
2011 Requirements Engineering  
This special issue of the Springer's Requirements Engineering journal aims at providing researchers and professionals with insights into the state-of-the-art in Digital Privacy from the views of Theory  ...  Moreover, developers need to update their software processes to ensure that privacy is not an afterthought whereby privacy measures become an addon or employed in an ad hoc or arbitrary fashion.  ...  Acknowledgments We would like to thank a number of people that contributed to the preparation of this special issue. First, we would like to thank Professor P. Loucopoulos and Professor W.  ... 
doi:10.1007/s00766-011-0117-0 fatcat:ccne2cr3c5fqtoutku2g7oxivy

A combined cyber and physical attack resilience scheme for Health Services Critical Infrastructure

Andreas Papalambrou, John Gialelis, Dimitrios Serpanos, S. Pantelakis, S. Koubias
2018 MATEC Web of Conferences  
This work focuses on proposing the basic components of a resilience scheme that can be used for the protection of Health Services Critical Infrastructure (HSCI) and the protection of its key assets based  ...  the security cycle in four dimensions as follows: • Prevention: maximum utilization of state-of-the-art ICT tools for new means of training, awareness, preparedness & anticipation; • Detection: state-of-the-art  ...  We are assured that Systemic Security Management (SSM) will be a management approach to security which serves the HSCI, which combines both cyber-attacks, and the people and processes of physical attacks  ... 
doi:10.1051/matecconf/201818805003 fatcat:gqchnulgh5d3tgdzcacaip3rou

GEMOM - Significant and Measurable Progress beyond the State of the Art

Habtamu Abie, Ilesh Dattani, Milan Novkovic, John Bigham, Shaun Topham, Reijo Savola
2008 2008 Third International Conference on Systems and Networks Communications  
While the existing state of the art achieves arbitrary resilience by a brute-force approach, self-healing is either rudimentary or non-existent.  ...  This paper describes the significant and measurable progress beyond state of the art envisioned by the GEMOM project.  ...  The authors acknowledge the contributions to the technical annex made by the members of the GEMOM consortium.  ... 
doi:10.1109/icsnc.2008.33 dblp:conf/icsnc/AbieDNBTS08 fatcat:xsd7hpi7zncp5cckxxcu4zk3py

Rights-Based Approaches to Preventing, Detecting, and Responding to Infectious Disease [chapter]

Benjamin Mason Meier, Dabney P. Evans, Alexandra Phelan
2020 International Library of Ethics, Law, and the New Medicine  
to assure the conditions for people to be healthy'. 6 States have long recognised a responsibility to protect their peoples from infectious disease threats, 7 developing varied approaches of what must  ...  In the South African case of the Ministry of Health vs.  ... 
doi:10.1007/978-3-030-39819-4_10 fatcat:wtuth2p5d5gnbg5d6czp5bk2ca
« Previous Showing results 1 — 15 out of 87,388 results