2014
DOI: 10.7763/lnse.2014.v2.141
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Security Estimation Based on Safety Architecture Design Patterns

Abstract: Abstract-The increasing connectivity of embedded systems requires more attention to security aspects. Security should not be post-engineered to a system, but should already be considered during system design. However, especially during early design phases it is difficult to judge the impact of high level design decisions, such as the decision for an overall system architecture, on security.To provide guidance for the system architecture selection for safety-related systems, we propose a quantitative security a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 12 publications
(11 reference statements)
0
7
0
Order By: Relevance
“…Ten out of those studies 74–83 were discussing architecture modeling. Twenty‐four studies 84–107 were discussing architecture analysis. Fourteen studies 77,108–120 were discussing how to make architectural design of systems both safe and secure through modeling and analysis.…”
Section: Mapping Study Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Ten out of those studies 74–83 were discussing architecture modeling. Twenty‐four studies 84–107 were discussing architecture analysis. Fourteen studies 77,108–120 were discussing how to make architectural design of systems both safe and secure through modeling and analysis.…”
Section: Mapping Study Resultsmentioning
confidence: 99%
“…are hazard analysis and threat modeling approaches. The use of STRIDE is mentioned alone in Preschern et al 85,100 and in combination with SAHARA in Macher et al 92,93 The use of SAHARA with FMVEA is mentioned in Dobaj et al 99 …”
Section: Mapping Study Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The main publications describing how to build the patterns are [1] and [35]. Other publications describe how the patterns are applied for the development of an industrial hydro-power plant controller ( [9], [36]). To evaluate the method, security metrics for the pattern are formulated and security risk metrics before and after applying the patterns are compared [36].…”
Section: Methods Maturitymentioning
confidence: 99%