2018
DOI: 10.3390/technologies6030065
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Security Requirements Engineering Framework for Cyber-Physical Systems

Abstract: Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only the software, but also the hardware perspective, including sensor and network security. Several models for secure software engineering processes have been proposed, but they are limited to software; therefore, to support the processes of security requirements, we ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(38 citation statements)
references
References 61 publications
0
38
0
Order By: Relevance
“…Moreover, thanks to the source code availability, OSS gives SMEs the possibility of developing highly customized and lean solutions based on their know-how. As a last remark, we emphasize that a growing amount of companies are providing support to open source IT solutions (Olson et al 2018).…”
Section: Ethernet-based Connectivity Technologies For Smementioning
confidence: 95%
See 1 more Smart Citation
“…Moreover, thanks to the source code availability, OSS gives SMEs the possibility of developing highly customized and lean solutions based on their know-how. As a last remark, we emphasize that a growing amount of companies are providing support to open source IT solutions (Olson et al 2018).…”
Section: Ethernet-based Connectivity Technologies For Smementioning
confidence: 95%
“…Among others, we highlight the trade-offs between outsourcing and in-house software development and between open-source software (OSS) and proprietary software tools. OSS is a viable alternative in terms of costs and independence to vendor-locked applications (Olson et al 2018). In fact, OSS does not require vendor-specialized consultants and tools, and allows the use of in-house available hardware and software rather than proprietary ones, subject to maintenance contracts.…”
Section: Ethernet-based Connectivity Technologies For Smementioning
confidence: 99%
“…In [21], the methodology of preparing the input data set for further analysis using machine learning methods is used to compromise the secret key of the ECC algorithm based on the risk of information leakage on the processor's side channel. The papers [22,23] address the issues of security in the conditions of modern cyber threats to objects of cyberphysics systems (CPS) and Internet of things (IoT) at the software level. However, the use of physical channels of information leakage allows access to the resources of these systems.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Literature offers general requirement engineering frameworks [6] as well as specialized in different disciplines [7][8][9]. However, there is a lack of specialized frameworks for electric motor development.…”
Section: Introductionmentioning
confidence: 99%