2013
DOI: 10.1109/jsyst.2012.2221853
|View full text |Cite
|
Sign up to set email alerts
|

The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 128 publications
(55 citation statements)
references
References 38 publications
(48 reference statements)
0
55
0
Order By: Relevance
“…Group is a binary relation, where Group(A, B) means that A is a new (virtual) component, which groups B (together with, possibly, other components). In this case A is a new component, and Group is consistent in terms of Contr and T hreat relations, as shown in Table 5 (6)- (12). The last composability relation is M erge, where M erge(A, B) means that a new component A is used to consolidate all the internal components (B, and possibly other components) into a new one and merges their states and relations, as represented in Table 5 (13)-(18).…”
Section: Fig 2: Examples Of Controls and Threatens Relationsmentioning
confidence: 82%
“…Group is a binary relation, where Group(A, B) means that A is a new (virtual) component, which groups B (together with, possibly, other components). In this case A is a new component, and Group is consistent in terms of Contr and T hreat relations, as shown in Table 5 (6)- (12). The last composability relation is M erge, where M erge(A, B) means that a new component A is used to consolidate all the internal components (B, and possibly other components) into a new one and merges their states and relations, as represented in Table 5 (13)-(18).…”
Section: Fig 2: Examples Of Controls and Threatens Relationsmentioning
confidence: 82%
“…Other analysis frameworks focus on the assessment of non-functionality qualities such as availability [10], interoperability [11], modifiability [12], and security [13]. These frameworks use Bayesian analysis or Visualizing and Measuring Enterprise Application Architecture June 28, 2013 probabilistic versions of the Object Constraint Language for enterprise modeling.…”
Section: Enterprise Architecture Analysismentioning
confidence: 99%
“…This paper exempli es the mapping functionality by instantiating a subset of the meta-model of the CySeMoL (Cyber Security Modeling Language) [10]. This modeling language follows the abstract model presented in [9] and uses the PRM formalism to estimate the value of security attributes from an architecture model.…”
Section: Cysemolmentioning
confidence: 99%