2014
DOI: 10.1007/978-3-319-10506-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Safety and Security Interactions Modeling Using the BDMP Formalism: Case Study of a Pipeline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
52
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(53 citation statements)
references
References 12 publications
1
52
0
Order By: Relevance
“…Using safety approaches to address cyber security concerns had been explored previously [23] [24] [25] [26]. In [27], the authors briefly claim that the STAMP methodology can be used both after an event to prevent future such events and before any such event to anticipate threats and mitigate them.…”
Section: System Theoretical Accident Model and Process (Stamp)mentioning
confidence: 99%
“…Using safety approaches to address cyber security concerns had been explored previously [23] [24] [25] [26]. In [27], the authors briefly claim that the STAMP methodology can be used both after an event to prevent future such events and before any such event to anticipate threats and mitigate them.…”
Section: System Theoretical Accident Model and Process (Stamp)mentioning
confidence: 99%
“…Compared with generic approaches, model-based approaches analyse security and safety in detail by means of formal representations and tools (Piètre-Cambacédès and Bouissou 2010; Kriaa et al 2014;Bloomfield et al 2013;Sun et al 2009). Bloomfield et al (2013) investigate the security impact on safety assessment in the context of critical infrastructure, based on ClaimsArguments-Evidence (CAE).…”
Section: Related Workmentioning
confidence: 99%
“…Such an approach offers (i) a tree-like representation to present the hierarchical relations between events and states, (ii) a quantitative analysis based on Markov processes by associating leaf events with estimated probabilities, and (iii) special "trigger" relations are designed to capture the interactions between events and states. This approach is also demonstrated with a case study in Kriaa et al (2014). The work provides a way to model and analyse the interdependency between security and safety, but it is not clear how conflicting relations between them can be detected and evaluated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, many of these works focus on qualitative aspects, or handle fewer risk metrics than we do, or support only independent quantitative annotations of attributes on the leaves. Related to AFTs are Booleandriven Markov processes (BDMPs, [37], [38]). However, there are several important differences: whereas our approach is compositional, BDMPs are monolithic, i.e.…”
Section: B Related Workmentioning
confidence: 99%