The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1002/smr.2338
|View full text |Cite
|
Sign up to set email alerts
|

A goal‐driven approach for the joint deployment of safety and security standards for operators of essential services

Abstract: Summary Designing safety‐critical software in domains ensuring essential services like transportation, energy, or health requires high assurance techniques and compliance with domain specific standards. As a result of the global interconnectivity and the evolution toward cyber‐physical systems, the increasing exposure to cyber threats calls for the adoption of cyber security standards and frameworks. Although safety and security have different cultures, both fields share similar concepts and tools and are wort… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 66 publications
(100 reference statements)
0
4
0
Order By: Relevance
“…Alternatively, we can implicitly document context information as constraints in logic formulae. However, to leverage the inherent ability of model-based development to overcome challenges due to the inherent complexity of CPS, 29,81,82 we propose a documentation format employing graphical models in the following. For each context perspective, we propose an example list of model elements motivated by our explanations from Section 3 along with a brief description and visual notational element.…”
Section: Notation and Examplesmentioning
confidence: 99%
See 2 more Smart Citations
“…Alternatively, we can implicitly document context information as constraints in logic formulae. However, to leverage the inherent ability of model-based development to overcome challenges due to the inherent complexity of CPS, 29,81,82 we propose a documentation format employing graphical models in the following. For each context perspective, we propose an example list of model elements motivated by our explanations from Section 3 along with a brief description and visual notational element.…”
Section: Notation and Examplesmentioning
confidence: 99%
“…We suggest that explicitly documenting facts and assumption about the system's context (which, in the following, we call “context information”) allows engineers to anticipate what happens when changes occur in the context at runtime. When explicitly documenting this context information alongside the regular engineering artifacts, permissible context configurations can be captured, which are known to retain adequate, safe, and secure functionality 24,29 . This can, for example, aid safety analysis and runtime adaptation, 30 as we will show in Section 6.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors identify cross‐fertilization between the two areas and how the method from one area can be utilized in the other. A very narrow view of this cross‐fertilization is discussed within the industrial control applications in the work of Kriaa et al 144 Another work on cross‐fertilization, focusing on common standards and approaches to deeper entangle safety and security, is from Ponsard et al 175 In contrast to these works, our study focuses on the MDE of safety and security systems, what are the proposed methods and tools for each development stage, and what are various types of contributions in this regard.…”
Section: Related Workmentioning
confidence: 99%