2011
DOI: 10.1007/978-3-642-23082-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Risk Analysis of Changing and Evolving Systems Using CORAS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…ISRA methods are often comprehensive and comparing tasks at a sufficient level of detail is challenging. There exist multiple frameworks for comparing ISRM/RA methods [2,9,[23][24][25][26][27]; however, these are primarily scoped to compare method content to a predetermined set of criteria. In these frameworks, evaluation proceeds from the predetermined criteria at the top to methods at the bottom.…”
Section: Framework Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…ISRA methods are often comprehensive and comparing tasks at a sufficient level of detail is challenging. There exist multiple frameworks for comparing ISRM/RA methods [2,9,[23][24][25][26][27]; however, these are primarily scoped to compare method content to a predetermined set of criteria. In these frameworks, evaluation proceeds from the predetermined criteria at the top to methods at the bottom.…”
Section: Framework Developmentmentioning
confidence: 99%
“…The former ENISA comparison [23] is a high-level comparison of methods, based on four predefined categories for ISRM and ISRA, eight in total. While similarly, Syalim et al [27] have published a comparative analysis that applies four predefined generic steps of the ISRA process for comparison. Both these studies compare a set of ISRA methods within a predefined set of criteria.…”
Section: Relationship To Other Literaturementioning
confidence: 99%
“…For instance, TROPOS provides a goal-risk framework for the analysis of risk and necessary countermeasures [11], [12], while the CORAS approach to model-driven risk analysis encompasses techniques and guidelines for the treatment of risk in changing systems where system and environment evolve dynamically [13]. However, typically opportunities are not taken into account, especially in the field of access control.…”
Section: Related Workmentioning
confidence: 99%
“…The method advances the state of the art with regards to other publications in the domain, e.g., [4], [5], [6], as it offers the possibility to relate system threats to system assumptions. This allows the rapid investigation of system design alternatives or identification of the most feared attackers (malicious actors) and threats, even when assumptions on attackers or threats change.…”
Section: Introductionmentioning
confidence: 99%