2015 IEEE 39th Annual Computer Software and Applications Conference 2015
DOI: 10.1109/compsac.2015.72
|View full text |Cite
|
Sign up to set email alerts
|

Restoring Security of Long-Living Systems by Co-evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…A generic approach was proposed by Bürger et al, which handles Essential Security Requirements. This is achieved by triggering Security Maintenance Rules if changes in the Security Context Knowledge are detected [16], [17]. Another generic mechanism by Tsigkanos et al describes a model checking approach to analyze threats and plan adaptations to mitigate those [18].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A generic approach was proposed by Bürger et al, which handles Essential Security Requirements. This is achieved by triggering Security Maintenance Rules if changes in the Security Context Knowledge are detected [16], [17]. Another generic mechanism by Tsigkanos et al describes a model checking approach to analyze threats and plan adaptations to mitigate those [18].…”
Section: Related Workmentioning
confidence: 99%
“…If M is better than the best solution in regard to a specific comparison metric, the best solution is replaced by M , the path to the best solution is stored, and the comparison ends (line [12][13][14][15][16]. The comparison also ends if M is worse than the best solution (line [17][18][19]. It is important to state that the amount of PCP instances will always be the first metric that will be used for comparison (line 9).…”
Section: B Algorithmic Improvementsmentioning
confidence: 99%
“…Bürger et al present an approach called SecVolution for supporting the evolution of systems to ensure the fulfillment of Essential Security Requirements [31], [20]. Changes in the Security Context Knowledge (e.g., changes in relevant legislation) may trigger the invocation of Security Maintenance Rules.…”
Section: Related Workmentioning
confidence: 99%
“…In that sense, and in order to provide to MBSE the means to deal with security since early development phases (in contrast to the common practice of adding security features This work is partially funded by Région Bretagne. later in the development process), several approaches adopt a security by design perspective and integrate security aspects into modeling languages (e.g., UMLsec [1], SysML-Sec [2], and secBPMN [3] among others). Such security aspects need to be taken into account when models evolve in order to avoid potential security issues.…”
Section: Introductionmentioning
confidence: 99%