Filters








97,156 Hits in 6.2 sec

Threat scenarios as a means to formally develop secure systems

Volkmar Lotz
1997 Journal of Computer Security  
We introduce a new method for the formal development of secure systems that closely corresponds to the way secure systems are developed in practice.  ...  Given a suitable system speci cation, threat scenarios can be derived systematically from that speci cation. Security is de ned as a particular relation on threat scenarios and systems.  ...  Acknowledgements This work has been performed at Technical University of Munich as part of the author's omgoing PhD studies.  ... 
doi:10.3233/jcs-1997-5103 fatcat:6odxj2t3rfeyhp2b5lwdvdyl2e

Threat scenarios as a means to formally develop secure systems [chapter]

Volkmar Lotz
1996 Lecture Notes in Computer Science  
We i n troduce a new method for the formal development of secure systems that closely corresponds to the way secure systems are developed in practice.  ...  Given a suitable system speci cation, threat scenarios can be derived systematically from that speci cation. Security is de ned as a particular relation on threat scenarios and systems.  ...  Acknowledgements This work has been performed at Technical University of Munich as part of the author's omgoing PhD studies.  ... 
doi:10.1007/3-540-61770-1_40 fatcat:s3i6lalveve3bnoxebv3lsdmwa

Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing [chapter]

Gencer Erdogan, Ketil Stølen
2017 Lecture Notes in Computer Science  
We have developed a domain-specific modeling language named CORAL that employs risk assessment to help security testers select and design test cases based on the available risk picture.  ...  This work has been conducted as part of the EMFASE project funded by SESAR Joint Undertaking (SESAR WP-E project, 2013-2016) managed by Eurocontrol, and the AGRA project (236657) funded by the Research  ...  A sequence diagram in CORAL may represent the system under test, its environment, as well as threat scenarios that the system under test and its environment are exposed to.  ... 
doi:10.1007/978-3-319-57858-3_8 fatcat:4omizw62tfe3fnyxucyjcmzchu

Towards Secure Mobile Multiagent Based Electronic Marketplace Systems

Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan
2002 Electronical Notes in Theoretical Computer Science  
Virtual market places of different types will serve as application scenarios, where security issues are addressed in all phases of the development process.  ...  In this paper we aim at a generic methodology to validate, assess, and construct mobile multi-agent systems in the domain of virtual market places.  ...  Formal security policies constitute the technical means to formalize such a management of trust.  ... 
doi:10.1016/s1571-0661(04)80337-2 fatcat:kny4vf4gqzbklblcn7pldy6bim

SRE_BBC: A Self-Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain-Based Cloud Systems

Irish Singh, Seok-Won Lee
2022 Sensors  
To build a self-adaptive secure BBC system that follows standard software development lifecycle principles to model secure SC, we propose the so-called self-adaptive security RE_BBC framework.  ...  The SC development lacks standard design processes that follow software lifecycle principles to model secure SC.  ...  Acknowledgments: We would like to sincerely thank all the subject matter experts for performing the SQUARE approach and the proposed approach for validating the healthcare data management blockchain-based  ... 
doi:10.3390/s22103903 pmid:35632312 fatcat:nhgc5qy5hrbnhi2hqsyd7v2d4a

Psychological readiness and ontologies in security of digital multilevel distributed systems

Olga Aleksandrovna Kosolapova
2021 Personality & Society  
A general model of system security ontology in a formal-semantic and infological form is proposed.  ...  There is also a negative impact of such an evolutionary process, for example, the emergence of IT risks and threats to the individual, society and society.  ...  Ontologies can be considered as a formal and practical tool.  ... 
doi:10.46502/issn.2712-8024/2021.3.2 fatcat:ehlpt5jjqrbl5hhf2ciotmlnai

Formal models for automotive systems and vehicular networks: Benefits and challenges

Eduardo dos Santos, Dominik Schoop, Andrew Simpson
2016 2016 IEEE Vehicular Networking Conference (VNC)  
Formal models have seen widespread use in the development of safety-and security-critical systemsprimarily as a means of providing increased assurance.  ...  To achieve this we present a formal threat model of an idealised system. We use Predicate/Transition (PrT) Nets, a graphical mathematical formalism, to represent threats and plausible attacks.  ...  FINAL CONSIDERATIONS AND FUTURE WORK We have presented a formal model of security threats faced by automotive systems and vehicular networks.  ... 
doi:10.1109/vnc.2016.7835940 dblp:conf/vnc/SantosSS16 fatcat:hkhnug2o6vgt7fdpe3jyvg6wa4

Development of scenario modeling of conflict tools in a security system based on formal grammars

Oleksandr Milov, Serhii Yevseiev, Andrii Vlasov, Sergey Herasimov, Oleh Dmitriiev, Maksym Kasianenko, Hennady Pievtsov, Yevhen Peleshok, Yuliia Tkach, Serhii Faraon
2019 Eastern-European Journal of Enterprise Technologies  
As for the possible actions of the attacker and the defender, they should be determined by a well-developed threat classifier, which should offer the most effective means of counteracting each of the threats  ...  Consider the use of the context-free grammar formalism to build a language with which you can describe scenarios of the behavior of conflicting parties in the security system.  ... 
doi:10.15587/1729-4061.2019.184274 fatcat:dv4w6g22yvddxiixyacp22rpmi

A Threat Model Driven Approach for Security Testing

Linzhang Wang, Eric Wong, Dianxiang Xu
2007 Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007)  
If an execution trace is an instance of a threat trace, security violations are reported and actions should be taken to mitigate the threat in the system.  ...  From a design-level threat model we extract a set of threat traces, each of which is an event sequence that should not occur during the system execution.  ...  To model the threat scenario, the first step we need to take is determine the security policy and potential threats to the system. A security policy says what is allowed and what is not.  ... 
doi:10.1109/sess.2007.2 dblp:conf/icse/WangWX07 fatcat:ubemjwhnejbtlg45kejtey6itm

The CORAS Language – why it is designed the way it is [chapter]

Bjørnar Solhaug, Ketil Stølen
2014 Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures  
ACKNOWLEDGMENTS The research leading to these results has received funding from the Research Council of Norway via the DIAMONDS project (201579/S10), and from the European Union's Seventh Framework Programme  ...  The diagram also documents a vulnerability that this threat may exploit, namely the use of web application. A threat scenario can lead to other threat scenarios and to unwanted incidents.  ...  The focus on security is mainly reflected in the language through reserved terms like "threat", "threat scenario" and "vulnerability". The focus on security is rather shallow.  ... 
doi:10.1201/b16387-456 fatcat:zmfxdtyhcfdtzesthcgzixy6oe

Model-Based Security Testing

Ina Schieferdecker, Juergen Grossmann, Martin Schneider
2012 Electronic Proceedings in Theoretical Computer Science  
This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.  ...  Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation.  ...  It is a graphbased modelling approach that emphasizes the modelling of threat scenarios and provides formalisms to annotate the threat scenarios with probability values and formalisms to reason with these  ... 
doi:10.4204/eptcs.80.1 fatcat:xbgolp2zlzflnast5eg5wqktwe

UMLsec: Extending UML for Secure Systems Development [chapter]

Jan Jürjens
2002 Lecture Notes in Computer Science  
Jan Jürjens, TU Munich: UMLsec: Extending UML for Secure Systems Development 15 Formal semantics for UML: Why Meaning of diagrams stated informally in (OMG 2001).  ...  Interconnected systems can be attacked anonymously and from a safe distance. Networked computers need to be secure.  ... 
doi:10.1007/3-540-45800-x_32 fatcat:pkqtu4vzafb6voy5kak7xvptom

Model-Based Security Engineering with UML: Introducing Security Aspects [chapter]

Jan Jürjens
2006 Lecture Notes in Computer Science  
Our aim is to aid the difficult task of developing security-critical systems in a formally based approach using the notation of the Unified Modeling Language.  ...  In particular, the associated constraints give criteria to evaluate the security aspects of a system design, by referring to a formal semantics of a simplified fragment of UML.  ...  Acknowledgements The research summarized in this chapter has benefitted from the help of too many people to be able to include here; they are listed in [Jür04] .  ... 
doi:10.1007/11804192_4 fatcat:ybeqhcrn2jam7c7wk6pkdit6w4

Using Dependent CORAS Diagrams to Analyse Mutual Dependency [chapter]

Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ketil Stølen
2008 Lecture Notes in Computer Science  
In this paper, we extend this language to capture context dependencies, and use it as a means to analyse mutual dependency. We refer to the extension as dependent CORAS diagrams.  ...  The CORAS method for security risk analysis provides a customized language, the CORAS diagrams, for threat and risk modelling.  ...  Attack trees [20] aim to provide a formal and methodical way of describing the security of a system based on the attacks it may be exposed to.  ... 
doi:10.1007/978-3-540-89173-4_12 fatcat:fcfr3wo5mrcpnp355cmtfdr3lu

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios

Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew Kalbarczyk, William H. Sanders, David M. Nicol
2015 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC)  
In this work, we develop a model-based process for assessing the security risks from NESCOR failure scenarios.  ...  The transformation of traditional power systems to smart grids brings significant benefits, but also exposes the grids to various cyber threats.  ...  We also thank Prageeth Gunathilaka, Li Yuan and Qi Qu for their valuable contributions in tool development.  ... 
doi:10.1109/prdc.2015.37 dblp:conf/prdc/JauharCTDKSN15 fatcat:fenmnoillzbe5lhedwfpo5vgne
« Previous Showing results 1 — 15 out of 97,156 results