2013
DOI: 10.1016/j.procs.2013.09.179
|View full text |Cite
|
Sign up to set email alerts
|

How to Develop Security Case by Combining Real Life Security Experiences (Evidence) with D-case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…The resulting cases have separate top claims for safety and security followed by separate argumentation; (iv) dynamic assurance cases (Calinescu et al 2017), an approach for generating arguments and evidence based on run-time patterns for the assurance cases of self-adaptive systems; (v) multiple viewpoint assurance cases where security is treated as an assurance viewpoint (Sljivo and Gallina 2016). The approach suggests to reuse AC artefacts by building multipleviewpoint AC using contracts, and introduces an algorithm for a model transformation from a contract meta model into an argumentation meta model; and (vi) dependability cases with focus on security (Patu and Yamamoto 2013a). -Documenting and visualizing SAC: These studies give guidelines of how to document a SAC, and visualize it (Poreddy and Corns 2011;Coffey et al 2014;Weinstock et al 2007).…”
Section: Rq2: Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…The resulting cases have separate top claims for safety and security followed by separate argumentation; (iv) dynamic assurance cases (Calinescu et al 2017), an approach for generating arguments and evidence based on run-time patterns for the assurance cases of self-adaptive systems; (v) multiple viewpoint assurance cases where security is treated as an assurance viewpoint (Sljivo and Gallina 2016). The approach suggests to reuse AC artefacts by building multipleviewpoint AC using contracts, and introduces an algorithm for a model transformation from a contract meta model into an argumentation meta model; and (vi) dependability cases with focus on security (Patu and Yamamoto 2013a). -Documenting and visualizing SAC: These studies give guidelines of how to document a SAC, and visualize it (Poreddy and Corns 2011;Coffey et al 2014;Weinstock et al 2007).…”
Section: Rq2: Approachesmentioning
confidence: 99%
“…For instance, different approaches which integrate SAC within the development life-cycle use different argumentation strategies (e.g., requirements Agudo et al 2009 and development phases Ray and Cleaveland 2015). The most common strategy depends on the output of a threat, vulnerability, asset or risk analysis (8 papers) (Cockram and Lautieri 2007;Coffey et al 2014;Cyra and Gorski 2007;Mohammadi et al 2018;Patu and Yamamoto 2013a;Vivas et al 2011;Xu et al 2017;Weinstock et al 2007). Other popular strategies are breaking down the claims based on the requirements or more specifically quality requirements and even more specifically security requirements (5 papers) (Agudo et al 2009;Calinescu et al 2017;Haley et al 2005;Netkachova et al 2015;Sklyar and Kharchenko 2017b), and arguing based on security properties, e.g., confidentiality, integrity and availability (5 papers) (Chindamaikul et al 2014;Finnegan and McCaffery 2014a;Mohammadi et al 2018;Poreddy and Corns 2011;Sklyar and Kharchenko 2017b).…”
Section: Argumentationmentioning
confidence: 99%
See 3 more Smart Citations