2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2017
DOI: 10.1109/qrs-c.2017.63
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…It is inspired from a previously reported case and features hybrid disruptions involving both malicious attacks and accidental failures 78 . It is already used as a benchmark for mixed safety and security analysis 60,79 …”
Section: Performing Quantitative Reasoningmentioning
confidence: 99%
“…It is inspired from a previously reported case and features hybrid disruptions involving both malicious attacks and accidental failures 78 . It is already used as a benchmark for mixed safety and security analysis 60,79 …”
Section: Performing Quantitative Reasoningmentioning
confidence: 99%
“…There are a large number of standards and norms, which have to be fulfilled in a safetycritical environment. That's why (Brunner et al, 2017) developed an approach how to model, document and integrate safety and security requirements. This approach doesn't consider the timing concern, just safety and security.…”
Section: Safety-critical Concernsmentioning
confidence: 99%
“…Davis et al [10] present a framework that extends the notion of dependability to include possible security violation for the power grid that utilizes state estimation and is evaluated in a simulated model of the power grid. More recently, Brunner et al [11] proposed a combined model for safety and security that is based on Unified Modeling Language (UML) diagrams. These models reside in a higher level of abstraction than our proposed model; they do not contain the structure of the system, do not consider evidence-based security assessment, assessment based on previous reported vulnerability data, and the evaluation targets certification of policy standards.…”
Section: State Of the Artmentioning
confidence: 99%