2010 IEEE International Conference on Systems, Man and Cybernetics 2010
DOI: 10.1109/icsmc.2010.5641922
|View full text |Cite
|
Sign up to set email alerts
|

Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes)

Abstract: Safety and security issues are increasingly converging on the same critical systems, leading to new situations in which these closely interdependent notions should now be considered together. Indeed, the related requirements, technical and organizational measures can have various interactions and side-effects ranging from mutual reinforcements to complete antagonisms. A better characterization of these inter dependencies is needed to ensure a controlled level of risk for the systems concerned by such a converg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(33 citation statements)
references
References 34 publications
(46 reference statements)
0
29
0
Order By: Relevance
“…Prior work in this area similarly represents attacks as developing progressively. It is thus commonly based on attack trees or graphs, Markov processes, state space models, Bayesian networks, etc., (31,(71)(72)(73) in which the central feature is that being in one state gives access to another.…”
Section: The Attack Affordance Graphmentioning
confidence: 99%
“…Prior work in this area similarly represents attacks as developing progressively. It is thus commonly based on attack trees or graphs, Markov processes, state space models, Bayesian networks, etc., (31,(71)(72)(73) in which the central feature is that being in one state gives access to another.…”
Section: The Attack Affordance Graphmentioning
confidence: 99%
“…Two basic ways of cross-fertilization include unified and harmonization. Unified methods [3], [4], [5], [6] use the same assessment method, models, and tools to estimate both safety and security of a system. Harmonization methods preserve and compare between the methods, models, and tools for safety and security.…”
Section: Related Workmentioning
confidence: 99%
“…Harmonization methods preserve and compare between the methods, models, and tools for safety and security. The Boolean logic Driven Markov Process (BDMP) [5] and the unified framework [6] are typical examples of the unified process. Our work in this article adopts the unified approach, while focusing on the case study of real-world systems.…”
Section: Related Workmentioning
confidence: 99%
“…Besides the one applied by us [11], Chang et al propose improvements for efficient broadcast authentication in wireless sensor networks [5]. An approach and tool for modeling safety and security interdependencies via Boolean logic Driven Markov Processes (BDMP) is shown in [9], following the analysis method known from fault and attack trees. For the selected real-time protocol from [7], that paper also contains experimental measurement setups for IEEE 802.11.…”
Section: Related Workmentioning
confidence: 99%