Proceedings of the 11th International Conference on Security and Cryptography 2014
DOI: 10.5220/0005050003150320
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Requirements for Security-enhanced Design of Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…To the best of our knowledge, only the works of References [31,32] and Reference [33] are similar to what we propose in terms of aiming at incorporating security as an objective that can be traded off with other objectives in the process of early DSE. In References [31,32], the authors introduce an UML-based approach in which application security requirements can be described together with security 'capabilities'-in addition to other extra-functional aspects such as performance and power consumption-of system components stored in a library. This then allows for a DSE process during which the application requirements are matched with the component capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, only the works of References [31,32] and Reference [33] are similar to what we propose in terms of aiming at incorporating security as an objective that can be traded off with other objectives in the process of early DSE. In References [31,32], the authors introduce an UML-based approach in which application security requirements can be described together with security 'capabilities'-in addition to other extra-functional aspects such as performance and power consumption-of system components stored in a library. This then allows for a DSE process during which the application requirements are matched with the component capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Ferrante et al [13] approach the issue of security requirements specification for embedded systems by defining a UML profile and developing an automatic process to generate system requirements from user requirements.…”
Section: Related Workmentioning
confidence: 99%