2015 5th International Conference on IT Convergence and Security (ICITCS) 2015
DOI: 10.1109/icitcs.2015.7292954
|View full text |Cite
|
Sign up to set email alerts
|

Assuring Security through Attribute GSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…However, these studies lack detailed guidelines of how to create these quantitative attributes. An example is the usage scenario that suggests to use attribute values for evaluating an architecture (Yamamoto 2015). The approach suggests to assign values to evidence, ranging from −2 to 2, based on how satisfying the evidence are to the claims, i.e., to what degree the provided evidence justify the claims.…”
Section: Potential For a Wide Range Of Benefitsmentioning
confidence: 99%
“…However, these studies lack detailed guidelines of how to create these quantitative attributes. An example is the usage scenario that suggests to use attribute values for evaluating an architecture (Yamamoto 2015). The approach suggests to assign values to evidence, ranging from −2 to 2, based on how satisfying the evidence are to the claims, i.e., to what degree the provided evidence justify the claims.…”
Section: Potential For a Wide Range Of Benefitsmentioning
confidence: 99%
“…Therefore, in 2015, Yamamoto made an improvement by presenting the Soft Goal using Weight (SGW) approach [8], [33], which can be used to define the priority among sub softgoals for quantitative goal decomposition. Yamamoto also proposed a quantitative architecture evaluation method called Attribute GSN by extending traditional GSN [10]. In this method, system safety and security attribute values are assigned to the GSN nodes to conduct quantitative safety and security assurance.…”
Section: Related Work a Nfr Assuring Approachesmentioning
confidence: 99%
“…To assess uncertainties which may affect the system's safety, researchers have proposed techniques to estimate confidence in structured assurance cases, either through qualitative or quantitative approaches [27,44]. The majority of these are based on the Dempster-Shafer Theory [31,60], Josang's Opinion Triangle [17], Bayesian Belief Networks (BNNs) [16,61], Evidential Reasoning (ER) [45] and weighted averages [59]. The approaches which use BBNs treat safety goals as nodes in the network and try to compute their conditional probability based on given probabilities for the leaf nodes of the network.…”
Section: Sources Of Uncertainty In Software Developmentmentioning
confidence: 99%
“…The area of system dependability has produced a significant body of work describing how to model assurance cases (e.g., [4,5,14,38]), and how to assess reviewer's confidence in the argument being made (e.g., [16,31,45,59,60]). There is also early work on assessing the impact of change on the assurance argument when the system undergoes change [39].…”
Section: Introductionmentioning
confidence: 99%