Proccedings of the 10th European Conference on Software Architecture Workshops 2016
DOI: 10.1145/2993412.3007555
|View full text |Cite
|
Sign up to set email alerts
|

Building multiple-viewpoint assurance cases using assumption/guarantee contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…This approach combines safety and security principles to create assurance cases with the main goal of achieving acceptable safety. The resulting cases have separate top claims for safety and security followed by separate argumentation; (iv) dynamic assurance cases (Calinescu et al 2017), an approach for generating arguments and evidence based on run-time patterns for the assurance cases of self-adaptive systems; (v) multiple viewpoint assurance cases where security is treated as an assurance viewpoint (Sljivo and Gallina 2016). The approach suggests to reuse AC artefacts by building multipleviewpoint AC using contracts, and introduces an algorithm for a model transformation from a contract meta model into an argumentation meta model; and (vi) dependability cases with focus on security (Patu and Yamamoto 2013a).…”
Section: Rq2: Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…This approach combines safety and security principles to create assurance cases with the main goal of achieving acceptable safety. The resulting cases have separate top claims for safety and security followed by separate argumentation; (iv) dynamic assurance cases (Calinescu et al 2017), an approach for generating arguments and evidence based on run-time patterns for the assurance cases of self-adaptive systems; (v) multiple viewpoint assurance cases where security is treated as an assurance viewpoint (Sljivo and Gallina 2016). The approach suggests to reuse AC artefacts by building multipleviewpoint AC using contracts, and introduces an algorithm for a model transformation from a contract meta model into an argumentation meta model; and (vi) dependability cases with focus on security (Patu and Yamamoto 2013a).…”
Section: Rq2: Approachesmentioning
confidence: 99%
“…The most common types of evidence reported in literature are test results (TR) (12 papers) (Ben Othmane and Ali 2016; Calinescu et al 2017;Cheah et al 2018;Chindamaikul et al 2014;Lipson and Weinstock 2008;Poreddy and Corns 2011;Shortt and Weber 2015;Sklyar and Kharchenko 2016, 2017a, b, 2019Sljivo and Gallina 2016) and different types of analysis. These analysis include threat and vulnerability (TVA) (Cockram and Lautieri 2007;McCaffery 2014a, b, Patu andYamamoto 2013a), code (CA) and bug (BA) (Chindamaikul et al 2014;Ben Othmane and Ali 2016;Sklyar and Kharchenko 2016, 2017a, b, 2019, security standards and policies (PA) (Agudo et al 2009;Netkachova et al 2015), risk (RA) (Mohammadi et al 2018), and log analysis (LA) (Mohammadi et al 2018;Patu and Yamamoto 2013a).…”
Section: Evidencementioning
confidence: 99%
See 3 more Smart Citations