A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Recent Advances towards the Industrial Application of Model-Driven Engineering for Assurance of Safety-Critical Systems
2018
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development
Recent Advances towards the Industrial Application of Model-Driven Engineering for Assurance of Safety-Critical Systems. ...
As a solution, many authors have argued that the use of Model-Driven Engineering principles and techniques can facilitate and improve assurance of safety-critical systems. ...
project, 2017) towards an architecture-driven, multi-concern assurance, reuseoriented, and seamlessly interoperable tool platform. ...
doi:10.5220/0006733906320641
dblp:conf/modelsward/Vara0E18
fatcat:4cafnwsfardv7kulj7jcju42cq
Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems
[chapter]
2016
Lecture Notes in Computer Science
This paper presents a recent initiative called AMASS (Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems) to promote harmonization, reuse and automation ...
AMASS will develop an integrated and holistic approach, a supporting tool ecosystem and a self-sustainable community for assurance and certification of CPS. ...
for hinging the assurance of both safety and security aspects such as partitioning and redundancies, or the SESAMO [9] component-oriented design methodology, based on model-driven technology and jointly ...
doi:10.1007/978-3-319-45480-1_25
fatcat:7mds4xwzcna35pyonmfajpymuy
System Security Assurance: A Systematic Literature Review
[article]
2022
arXiv
pre-print
We conducted a systematic review of requirements, processes, and activities involved in system security assurance including security requirements, security metrics, system and environments and assurance ...
In this paper, extensive efforts have been made to study the state-of-the-art, limitations and future research directions for security assurance of the ICT and cyber-physical systems (CPS) in a wide range ...
Acknowledgment This work was carried out during the tenure of an ERCIM 'Alain Bensoussan' Fellowship Programme. This work is also partially supported by Norwegian Cyber Range, NTNU, Norway. ...
arXiv:2110.01904v2
fatcat:wivzen3vmvafldt5vfgnpbssjy
Preface to the special issue: Architecture-Driven Semantic Analysis of Embedded Systems
2015
Science of Computer Programming
OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. ...
At the core of the architecture-driven "single-source" DES design is the automatic generation of analytical models from the common architectural model. ...
Such a repository enables automatic generation of analytical models for different aspects of the system, such as timing, reliability, security, performance, etc. ...
doi:10.1016/j.scico.2015.05.002
fatcat:dhks2qgsorb5del35guravkgli
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
2016
2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)
This paper describes a data driven approach to studying the science of cyber security (SoS). It argues that science is driven by data. ...
, and (iii) A Risk-based Approach to Security Metrics. ...
ACKNOWLEDGMENT We acknowledge the support of AFOSR (contract MURI FA9550-08-1-0265) for this work. We thank Dr. Robert Herklotz for his encouragement. ...
doi:10.1109/iri.2016.10
dblp:conf/iri/ThuraisinghamKH16
fatcat:tjclsakmazazbls4r3lk5uv4dq
Process Artifacts Defined as an Aspectual Service to System Models
2006
2006 Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER'06 - RE'06 Workshop)
We discuss our approach in the context of designing tool support for a system security Certification and Accreditation (C&A) process automation based on service-oriented and aspect-oriented design paradigms ...
Process artifacts identified from a process description often implicitly bias and cross-cut the definition of generic services from various tools that assist/automate process activities. ...
Acknowledgement: This work is partially supported by grant from SPAWAR Systems Center, Department of Navy, Charleston, SC, USA. ...
doi:10.1109/soccer.2006.7
fatcat:gmcu4zkwnbenrmyky3fgvco4g4
Selected contributions from the Open Source Software Certification (OpenCert) workshops
2014
Science of Computer Programming
OpenCert provides for a unique venue advancing the state of the art in the analysis and assurance of open source software with an ultimate aim of achieving certification and standards. ...
Breuer and Pickin take advantage of the modern shift towards the cloud computing paradigm and propose a 'volunteer cloud' to analyse large open source code bases. ...
such efforts will help realise the various critical factors underpinning open source software projects that are successful from those that are not. ...
doi:10.1016/j.scico.2014.04.007
fatcat:lmnuuihzqvar5iajl2gd5nggsa
Towards security effectiveness measurement utilizing risk-based security assurance
2010
2010 Information Security for South Africa
This paper introduces an enhanced methodology to develop security effectiveness metrics that can be used in connection with correctness assurance of security controls. ...
Systematic and practical approaches to risk-driven operational security evidence help ensure the effectiveness and efficiency of security controls in business-critical applications and services. ...
Security assurance activities focus on certain components of the SuI and the system as a whole. ...
doi:10.1109/issa.2010.5588322
fatcat:joplcg5eljbhdo7hzurf67mk7a
Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures
2007
10th IEEE High Assurance Systems Engineering Symposium (HASE'07)
This paper presents from a commercial perspective a critical assessment of the limitations of today's SOA based approaches to high assurance. ...
A use case from the Finance Sector is presented, which has deep implications in terms of high availability, security and spatial awareness in a SOA environment. ...
These requirements include: • Provision of a single hosting environment integrating the various best of breed open source high assurance components. • Define a proven and robust security model across the ...
doi:10.1109/hase.2007.45
dblp:conf/hase/DonachyPHS07
fatcat:yca65wdcynhizkcqx3cf4ye5he
Can We Ever Build Survivable Systems from COTS Components?
[chapter]
2002
Lecture Notes in Computer Science
This paper describes a risk-mitigation framework for deciding when and how COTS components can be used to build survivable systems. ...
However, there is considerable evidence that COTS-based systems are being used in domains where significant economic damage and even loss-of-life are possible in the event of a major system failure or ...
Carol A. Sledge, a colleague at the Software Engineering Institute, for her valuable comments and suggestions based on her review of an earlier draft of this paper. ...
doi:10.1007/3-540-47961-9_17
fatcat:tsp3uteffnawrndf3rl6rfir24
Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
2014
International Journal of Intelligent Information Systems
The criteria for selecting the specific systems are -containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection ...
The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). ...
steps toward a hybrid model. ...
doi:10.11648/j.ijiis.20140305.11
fatcat:cokovldx2bhrncolsi6atrvrsi
DevSecOps in Robotics
[article]
2021
arXiv
pre-print
We finalize with a discussion on the relationship between security, quality and safety, open problems and future research questions. ...
In this article we introduce DevSecOps in Robotics, a set of best practices designed to help roboticists implant security deep in the heart of their development and operations processes. ...
This work has partially been funded by the ROS-Industrial Quality-Assured Robot Software Components (ROSin) RedROS-I and RedROS2-I FTPs which received funding from the European Union's Horizon 2020 research ...
arXiv:2003.10402v3
fatcat:qjc3pdfmpnduvfwgyqjk5tey4y
Towards Transparent and Trustworthy Cloud
2017
IEEE Cloud Computing
In this paper, we start from the assumption that an opaque cloud does not fit security, and present a reliable evidence collection process and infrastructure extending existing assurance techniques towards ...
Cloud assurance techniques, developed to assess the trustworthiness of cloud services, can play a major role in building trust. ...
Also, he is interested in models and platforms supporting open source development. He has served and is serving in all capacities on many congress, conference, and workshop committees. ...
doi:10.1109/mcc.2017.51
fatcat:o66qvfknu5haxjgzmnwxxgqxou
2018 Index IEEE Transactions on Software Engineering Vol. 44
2019
IEEE Transactions on Software Engineering
Han, A., þ, TSE Oct. 2018 1001-1023
J
Java
A Study of Social Interactions in Open Source Component Use. ...
Wang, Y., þ, TSE March 2018 291-307
Collaboration
A Study of Social Interactions in Open Source Component Use. ...
doi:10.1109/tse.2018.2887195
fatcat:sss2tw3g2bb2xpsrbh6oyrduti
Towards trustworthy end-to-end communication in industry 4.0
2017
2017 IEEE 15th International Conference on Industrial Informatics (INDIN)
We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges ...
Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for data-exchange. ...
AMASS (Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems) 9 project aims on developing a holistic approach for assurance and certification of CPS by ...
doi:10.1109/indin.2017.8104889
dblp:conf/indin/BicakuMPTMSMTD17
fatcat:lvyqyffri5dwzgussmnpsfse44
« Previous
Showing results 1 — 15 out of 74,495 results