2013 IEEE 16th International Conference on Computational Science and Engineering 2013
DOI: 10.1109/cse.2013.31
|View full text |Cite
|
Sign up to set email alerts
|

Identifying and Implementing Security Patterns for a Dependable Security Case -- From Security Patterns to D-Case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…For five papers, the use of SAC can be categorised as providing process and life-cycle support. One paper Aid in communication as it provides a summary of issues and their interrelationship Patu and Yamamoto (2013b) Aid in the survival of modern system, with respect to security challenges Ray and Cleaveland (2015) Comply with internal needs from cyber-physical systems' manufacturers suggests to use SAC to communicate between organisations involved in developing and using medical devices and one paper uses SAC to teach students about information security.…”
Section: Usage Scenariosmentioning
confidence: 99%
See 4 more Smart Citations
“…For five papers, the use of SAC can be categorised as providing process and life-cycle support. One paper Aid in communication as it provides a summary of issues and their interrelationship Patu and Yamamoto (2013b) Aid in the survival of modern system, with respect to security challenges Ray and Cleaveland (2015) Comply with internal needs from cyber-physical systems' manufacturers suggests to use SAC to communicate between organisations involved in developing and using medical devices and one paper uses SAC to teach students about information security.…”
Section: Usage Scenariosmentioning
confidence: 99%
“…There are 17 reported prerequisites. The majority belong to approaches (11) (Chindamaikul et al 2014;Cockram and Lautieri 2007;Cyra and Gorski 2007;Hawkins et al 2015;Patu and Yamamoto 2013a;Ankrum and Kromholz 2005;Cheah et al 2018;Sljivo and Gallina 2016;Tippenhauer et al 2014;Vivas et al 2011;Xu et al 2017) while the remaining ones belong to usage scenarios (2) (Bloomfield et al 2017;Goodger et al 2012), patterns (2) (Patu and Yamamoto 2013b;He and Johnson 2012), and tools (1) (Gacek et al 2014). We categorize prerequisites as follows: The studies in this category require the existence or performing certain analysis and models to achieve their purpose.…”
Section: Prerequisitesmentioning
confidence: 99%
See 3 more Smart Citations