메뉴 건너뛰기




Volumn 92, Issue 11, 2007, Pages 1492-1502

Addressing dependability by applying an approach for model-based risk assessment

Author keywords

Dependability; Model based risk analysis; Safety; Security; Tools; Trust case

Indexed keywords

CONTROL SYSTEMS; DIGITAL INSTRUMENTS; MATHEMATICAL MODELS; TELEMEDICINE;

EID: 34447121305     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2006.10.002     Document Type: Article
Times cited : (11)

References (28)
  • 1
    • 34447127585 scopus 로고    scopus 로고
    • Thunem AP-J. Modelling of knowledge intensive computerised systems based on capability-oriented agent theory (COAT). In: International IEEE conference on integration of knowledge intensive multi-agent systems, IEEE-KIMAS'03, Cambridge, MA, USA, 2003. p. 58-63.
  • 2
    • 0029306360 scopus 로고
    • The dynamic flow graph methodology for assessing the dependability of embedded software systems
    • Garrett C.J., Guarro S.B., and Apostolakis G.E. The dynamic flow graph methodology for assessing the dependability of embedded software systems. IEEE Trans Syst Man Cybernet 25 5 (1985) 824-840
    • (1985) IEEE Trans Syst Man Cybernet , vol.25 , Issue.5 , pp. 824-840
    • Garrett, C.J.1    Guarro, S.B.2    Apostolakis, G.E.3
  • 3
    • 0023427061 scopus 로고
    • Application of goal tree-success tree model as the knowledge-base of operator advisory system
    • Kim I.S., and Modarres M. Application of goal tree-success tree model as the knowledge-base of operator advisory system. Nucl Eng Design J 104 (1987) 67-81
    • (1987) Nucl Eng Design J , vol.104 , pp. 67-81
    • Kim, I.S.1    Modarres, M.2
  • 4
    • 34447130314 scopus 로고    scopus 로고
    • Jalashgar A, (Thunem AP-J). A Cognitive and formal terminology for descriptive parameters in concurrent real-time distributed software systems. In: Soft Comput Risk Eval Manage 2001; 2(3): 229-48.
  • 5
    • 0031996441 scopus 로고    scopus 로고
    • Identification of hidden failures in process control systems based on the HMG method
    • Jalashgar A., and (Thunem A.P.-J.). Identification of hidden failures in process control systems based on the HMG method. Int J Intell Syst 13 (1998) 159-179
    • (1998) Int J Intell Syst , vol.13 , pp. 159-179
    • Jalashgar, A.1    (Thunem A.P.-J.)2
  • 6
    • 34447115762 scopus 로고    scopus 로고
    • CORAS. A platform for risk analysis of security critical systems, IST-2000-25031, 2000. 〈http://coras.sourceforge.net/〉.
  • 7
    • 34447129658 scopus 로고    scopus 로고
    • Fredriksen R, Gran BA, Stølen K, Djordjevic I. Experiences from application of model-based risk assessment. In: Proceedings of the European conference on safety and reliability (ESREL'2003) vol. 1, 2003. Swets & Zeitlinger. p. 643-48.
  • 10
    • 0041837967 scopus 로고
    • A state-of-the-art review of FMEA/FMECA
    • Bouti A., and Kadi A.D. A state-of-the-art review of FMEA/FMECA. Int J Reliab Qual Safety Eng 1 4 (1994) 515-543
    • (1994) Int J Reliab Qual Safety Eng , vol.1 , Issue.4 , pp. 515-543
    • Bouti, A.1    Kadi, A.D.2
  • 11
    • 0016444204 scopus 로고
    • A reliability model for systems with markov structure
    • Littlewood B. A reliability model for systems with markov structure. Appl Stat 24 2 (1975) 172-177
    • (1975) Appl Stat , vol.24 , Issue.2 , pp. 172-177
    • Littlewood, B.1
  • 12
    • 0001094070 scopus 로고
    • Use of the CRAMM in Health Information Systems
    • Lun K.C., Degoulet P., Piemme T.E., and Rienhoff O. (Eds), North Holland Publishing Co, Amsterdam
    • Barber B., and Davey J. Use of the CRAMM in Health Information Systems. In: Lun K.C., Degoulet P., Piemme T.E., and Rienhoff O. (Eds). MEDINFO 92 (1992), North Holland Publishing Co, Amsterdam 1589-1593
    • (1992) MEDINFO 92 , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 13
    • 34447116421 scopus 로고    scopus 로고
    • OMG. Unified modeling language specification. Version 1.4, 2001.
  • 14
    • 34447122035 scopus 로고    scopus 로고
    • Houmb S-H, den Braber F, Soldal Lund M, Stølen K. Towards a UML profile for model-based risk assessment. In Proc. UML'2002 Satellite Workshop on Critical Systems Development with UML. Munich University of Technology. 2002. p. 79-91.
  • 15
    • 34447133563 scopus 로고    scopus 로고
    • Contribution in response to request for proposals for UML Profile for Modelling Quality of Service and Fault Tolerance Characteristics and Mechanisms issued by the Object Management Group. Submitted by SINTEF in collaboration with OpenIT, September 9, 2002. Resubmitted in revised form, May and August, 2003.
  • 16
    • 34447132297 scopus 로고    scopus 로고
    • Australian Standard: Risk Management. AS/NZS 4360:1999. Strathfield: Standards Australia.
  • 18
    • 57049132856 scopus 로고    scopus 로고
    • The CORAS approach for model-based risk management applied to a telemedicine service
    • IOS Press
    • Stamatiou Y., et al. The CORAS approach for model-based risk management applied to a telemedicine service. Proceedings of Medical Informatics Europe (MIE'2003) (2003), IOS Press 206-211
    • (2003) Proceedings of Medical Informatics Europe (MIE'2003) , pp. 206-211
    • Stamatiou, Y.1
  • 20
    • 34447123848 scopus 로고    scopus 로고
    • IEC 61508: Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related (E/E/PE) Systems, 1998-2000.
  • 23
    • 84857462828 scopus 로고    scopus 로고
    • Thunem AP-J, Gran BA, Skjerve ABM. Application of model-based risk analysis in a risk-informed man, technology and organisation model. In: Proceedings of the European conference on safety and reliability (ESREL'2005) 2005. Tri City, Poland. p. 1919-24.
  • 24
    • 34447121411 scopus 로고    scopus 로고
    • A framework for dependable development process of complex computerised systems
    • Springer, Berlin, Germany
    • Thunem A.P.-J. A framework for dependable development process of complex computerised systems. Proceedings of ESREL04/PSAM7 conference (2004), Springer, Berlin, Germany 902-907
    • (2004) Proceedings of ESREL04/PSAM7 conference , pp. 902-907
    • Thunem, A.P.-J.1
  • 26
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • IEEE Computer Society Press
    • Sindre G., and Opdahl A.L. Eliciting security requirements by misuse cases. Proceedings of TOOLS_PACIFIC 2000 (2000), IEEE Computer Society Press 120-131
    • (2000) Proceedings of TOOLS_PACIFIC 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2
  • 28
    • 34447123847 scopus 로고    scopus 로고
    • Thunem AP-J, Fredriksen R, Gran BA. An information retrieval terminology for model-based risk assessment. Paper to appear in Proceedings from ESREL/PSAM7, Berlin, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.