메뉴 건너뛰기




Volumn 86, Issue 4, 2013, Pages 1124-1151

Comparing risk identification techniques for safety and security requirements

Author keywords

Comparison; Requirement elicitation; Risk identification; Safety; Security; Technique

Indexed keywords

COMPARISON; REQUIREMENT ELICITATION; RISK IDENTIFICATION; SECURITY; TECHNIQUE;

EID: 84875249203     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2012.12.002     Document Type: Conference Paper
Times cited : (73)

References (90)
  • 7
    • 73549123101 scopus 로고    scopus 로고
    • Software & systems requirements engineering
    • 1st ed. McGraw-Hill, Inc. New York, NY, USA
    • B. Berenbach, D. Paulish, J. Kazmeier, and A. Rudorfer Software & systems requirements engineering Practice 1st ed. 2009 McGraw-Hill, Inc. New York, NY, USA
    • (2009) Practice
    • Berenbach, B.1    Paulish, D.2    Kazmeier, J.3    Rudorfer, A.4
  • 8
    • 79952012221 scopus 로고    scopus 로고
    • Systems engineering and safety - A framework
    • D. Black, M. Hull, and K. Jackson Systems engineering and safety - a framework Software, IET 5 1 2011 43 53
    • (2011) Software, IET , vol.5 , Issue.1 , pp. 43-53
    • Black, D.1    Hull, M.2    Jackson, K.3
  • 12
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • doi:10.1007/s00766-010-0115-7
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requirements Engineering 16 2011 3 32 doi:10.1007/s00766-010-0115- 7
    • (2011) Requirements Engineering , vol.16 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 14
    • 84355162916 scopus 로고    scopus 로고
    • Towards developing consistent misuse case models
    • Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering
    • M. El-Attar Towards developing consistent misuse case models Journal of Systems and Software 85 2 2012 323 339 Special issue with selected papers from the 23rd Brazilian Symposium on Software Engineering
    • (2012) Journal of Systems and Software , vol.85 , Issue.2 , pp. 323-339
    • El-Attar, M.1
  • 20
    • 67349162622 scopus 로고    scopus 로고
    • Integrating cyber attacks within fault trees
    • The 18th European Safety and Reliability Conference, ESREL 2007
    • I.N. Fovino, M. Masera, and A.D. Cian Integrating cyber attacks within fault trees Reliability Engineering and System Safety 94 9 2009 1394 1402 The 18th European Safety and Reliability Conference, ESREL 2007
    • (2009) Reliability Engineering and System Safety , vol.94 , Issue.9 , pp. 1394-1402
    • Fovino, I.N.1    Masera, M.2    Cian, A.D.3
  • 28
    • 84875278431 scopus 로고    scopus 로고
    • IEC 61025 Fault tree analysis (FTA). International Electrotechnical Commission, 2nd ed
    • IEC 61025, 2006. Fault tree analysis (FTA). International Electrotechnical Commission, 2nd ed.
    • (2006)
  • 30
    • 84875233443 scopus 로고    scopus 로고
    • IEC 62502, 2010. Analysis techniques for dependability - event tree analysis (ETA). International Electrotechnical Commission, 1st ed
    • IEC 62502, 2010. Analysis techniques for dependability - event tree analysis (ETA). International Electrotechnical Commission, 1st ed.
  • 31
    • 84875252517 scopus 로고    scopus 로고
    • ISO27002:2005, 2005. Information Technology-security techniques-code of practice for information security management
    • ISO27002:2005, 2005. Information Technology-security techniques-code of practice for information security management.
  • 32
    • 84875241611 scopus 로고    scopus 로고
    • ISO73:2009, 2009. Risk management-vocabulary
    • ISO73:2009, 2009. Risk management-vocabulary.
  • 33
    • 28044436975 scopus 로고    scopus 로고
    • Problem frames and software engineering
    • Special Issue on Problem Frames
    • M. Jackson Problem frames and software engineering Information and Software Technology 47 14 2005 903 912 Special Issue on Problem Frames
    • (2005) Information and Software Technology , vol.47 , Issue.14 , pp. 903-912
    • Jackson, M.1
  • 34
    • 84862154113 scopus 로고    scopus 로고
    • Hazard analysis and risk assessment in the development of biomedical drug formulation equipment
    • doi:10.1007/s10439-011-0451-x
    • D. Johnson, M. Bidez, and L. DeLucas Hazard analysis and risk assessment in the development of biomedical drug formulation equipment Annals of Biomedical Engineering 40 2012 898 906 doi:10.1007/s10439-011-0451-x
    • (2012) Annals of Biomedical Engineering , vol.40 , pp. 898-906
    • Johnson, D.1    Bidez, M.2    Delucas, L.3
  • 35
    • 77956604734 scopus 로고    scopus 로고
    • Integrating system modelling with safety activities
    • E. Schoitsch, Springer Berlin/Heidelberg volume 6351 of Lecture Notes in Computer Science
    • B. Kaiser, V. Klaas, S. Schulz, C. Herbst, and P. Lascych Integrating system modelling with safety activities E. Schoitsch, Computer Safety, Reliability, and Security 2010 Springer Berlin/Heidelberg 452 465 volume 6351 of Lecture Notes in Computer Science
    • (2010) Computer Safety, Reliability, and Security , pp. 452-465
    • Kaiser, B.1    Klaas, V.2    Schulz, S.3    Herbst, C.4    Lascych, P.5
  • 37
  • 38
    • 27644567603 scopus 로고    scopus 로고
    • Technical Report Joint Technical Report Keele University Technical Report TR/SE-0401 and NICTA Technical Report 0400011T.1. Software Engineering Group Department of Computer Science Keele University and Empirical Software Engineering National ICT Australia Ltd
    • Kitchenham, B.; 2004. Procedures for Performing Systematic Reviews. Technical Report Joint Technical Report Keele University Technical Report TR/SE-0401 and NICTA Technical Report 0400011T.1. Software Engineering Group Department of Computer Science Keele University and Empirical Software Engineering National ICT Australia Ltd.
    • (2004) Procedures for Performing Systematic Reviews
    • Kitchenham, B.1
  • 39
    • 79952577498 scopus 로고    scopus 로고
    • Foundations of attackdefense trees
    • P. Degano, S. Etalle, J. Guttman, Springer Berlin/Heidelberg volume 6561 of Lecture Notes in Computer Science
    • B. Kordy, S. Mauw, S. Radomirovic, and P. Schweitzer Foundations of attackdefense trees P. Degano, S. Etalle, J. Guttman, Formal Aspects of Security and Trust 2011 Springer Berlin/Heidelberg 80 95 volume 6561 of Lecture Notes in Computer Science
    • (2011) Formal Aspects of Security and Trust , pp. 80-95
    • Kordy, B.1    Mauw, S.2    Radomirovic, S.3    Schweitzer, P.4
  • 40
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • IEEE Computer Society, ICSE '04, Washington, DC, USA
    • A. van Lamsweerde Elaborating security requirements by construction of intentional anti-models Proceedings of the 26th International Conference on Software Engineering IEEE Computer Society, ICSE '04, Washington, DC, USA 2004 148 157
    • (2004) Proceedings of the 26th International Conference on Software Engineering , pp. 148-157
    • Van Lamsweerde, A.1
  • 42
    • 84857334492 scopus 로고    scopus 로고
    • Fault tree synthesis from UML models for reliability analysis at early design stages
    • C. Lauer, R. German, and J. Pollmer Fault tree synthesis from UML models for reliability analysis at early design stages SIGSOFT Softw Eng Notes 36 1 2011 1 8
    • (2011) SIGSOFT Softw Eng Notes , vol.36 , Issue.1 , pp. 1-8
    • Lauer, C.1    German, R.2    Pollmer, J.3
  • 43
    • 84857369483 scopus 로고    scopus 로고
    • Task descriptions versus use cases
    • 10.1007/s00766-011-0140-1
    • S. Lauesen, and M. Kuhail Task descriptions versus use cases Requirements Engineering 17 2012 3 18 10.1007/s00766-011-0140-1
    • (2012) Requirements Engineering , vol.17 , pp. 3-18
    • Lauesen, S.1    Kuhail, M.2
  • 44
    • 83755171647 scopus 로고    scopus 로고
    • Safety requirements analysis for control law development of UAV flight control systems
    • The 2nd International Symposium on Aircraft Airworthiness
    • G. Lei, and Z. Shuguang Safety requirements analysis for control law development of UAV flight control systems Procedia Engineering 17 0 2011 505 514 The 2nd International Symposium on Aircraft Airworthiness
    • (2011) Procedia Engineering , vol.17 , Issue.0 , pp. 505-514
    • Lei, G.1    Shuguang, Z.2
  • 45
    • 0038349056 scopus 로고    scopus 로고
    • Deriving operational software specifications from system goals
    • E. Letier, and A. van Lamsweerde Deriving operational software specifications from system goals SIGSOFT Softw Eng Notes 27 6 2002 119 128
    • (2002) SIGSOFT Softw Eng Notes , vol.27 , Issue.6 , pp. 119-128
    • Letier, E.1    Van Lamsweerde, A.2
  • 47
    • 17044370046 scopus 로고    scopus 로고
    • Technical Report 2003/10. Department of Computing, Faculty of Mathematics and Computing, The Open University; Walton Hall, Milton Keynes, MK7 6AA, United Kingdom
    • Lin, L.; Nuseibeh, B.A.; Ince, D.C.; Jackson, M.; Moffett, J.D.; 2003. Analysing Security Threats and Vulnerabilities Using Abuse Frames. Technical Report 2003/10. Department of Computing, Faculty of Mathematics and Computing, The Open University; Walton Hall, Milton Keynes, MK7 6AA, United Kingdom.
    • (2003) Analysing Security Threats and Vulnerabilities Using Abuse Frames
    • Lin, L.1    Nuseibeh, B.A.2    Ince, D.C.3    Jackson, M.4    Moffett, J.D.5
  • 49
    • 80053016464 scopus 로고    scopus 로고
    • Computer-aided PHA, FTA and FMEA for automotive embedded systems
    • F. Flammini, S. Bologna, V. Vittorini, Springer Berlin/Heidelberg volume 6894 of Lecture Notes in Computer Science
    • R. Mader, E. Armengaud, A. Leitner, C. Kreiner, Q. Bourrouilh, G. Grienig, C. Steger, and R. Wei Computer-aided PHA, FTA and FMEA for automotive embedded systems F. Flammini, S. Bologna, V. Vittorini, Computer Safety, Reliability, and Security 2011 Springer Berlin/Heidelberg 113 127 volume 6894 of Lecture Notes in Computer Science
    • (2011) Computer Safety, Reliability, and Security , pp. 113-127
    • Mader, R.1    Armengaud, E.2    Leitner, A.3    Kreiner, C.4    Bourrouilh, Q.5    Grienig, G.6    Steger, C.7    Wei, R.8
  • 53
    • 79953033529 scopus 로고    scopus 로고
    • Secure software systems engineering: The secure tropos approach
    • H. Mouratidis Secure software systems engineering: the secure tropos approach Journal of Software 6 2011 331 339
    • (2011) Journal of Software , vol.6 , pp. 331-339
    • Mouratidis, H.1
  • 55
    • 70450206834 scopus 로고    scopus 로고
    • Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems
    • M. Barley, H. Mouratidis, A. Unruh, D. Spears, P. Scerri, F. Massacci, Springer Berlin/Heidelberg volume 4324 of Lecture Notes in Computer Science
    • H. Mouratidis, and P. Giorgini Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems M. Barley, H. Mouratidis, A. Unruh, D. Spears, P. Scerri, F. Massacci, Safety and Security in Multiagent Systems 2009 Springer Berlin/Heidelberg 8 26 volume 4324 of Lecture Notes in Computer Science
    • (2009) Safety and Security in Multiagent Systems , pp. 8-26
    • Mouratidis, H.1    Giorgini, P.2
  • 59
    • 84875260999 scopus 로고    scopus 로고
    • The integration of safety and security requirements
    • K. Kanoun, Springer Berlin/Heidelberg Volume 1698 of Lecture Notes in Computer Science
    • A. Pasquini, D. Eames, and J. Moffett The integration of safety and security requirements K. Kanoun, Computer Safety, Reliability and Security 1999 Springer Berlin/Heidelberg 685 Volume 1698 of Lecture Notes in Computer Science
    • (1999) Computer Safety, Reliability and Security , pp. 685
    • Pasquini, A.1    Eames, D.2    Moffett, J.3
  • 62
    • 84875257514 scopus 로고    scopus 로고
    • The SEMA referential framework: Avoiding ambiguities when dealing with security and safety issues
    • Washington, DC, USA Not included in the conference proceedings (selected for publication in IJCIP)
    • Piètre-Cambacédès L.; Chaudet C. The SEMA referential framework: avoiding ambiguities when dealing with security and safety issues. In: 4th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (CIP 2010). Washington, DC, USA Not included in the conference proceedings (selected for publication in IJCIP).
    • 4th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (CIP 2010)
    • Piètre-Cambacédès, L.1    Chaudet, C.2
  • 64
    • 84864207296 scopus 로고    scopus 로고
    • A combined process for elicitation and analysis of safety and security requirements
    • I. Bider, T. Halpin, J. Krogstie, S. Nurcan, E. Proper, R. Schmidt, P. Soffer, S. Wrycza, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, Springer Berlin/Heidelberg Volume 113 of Lecture Notes in Business Information Processing
    • C. Raspotnig, P. Karpati, and V. Katta A combined process for elicitation and analysis of safety and security requirements I. Bider, T. Halpin, J. Krogstie, S. Nurcan, E. Proper, R. Schmidt, P. Soffer, S. Wrycza, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, W. Aalst, J. Mylopoulos, M. Rosemann, M.J. Shaw, C. Szyperski, Enterprise, Business-Process and Information Systems Modeling 2012 Springer Berlin/Heidelberg 347 361 Volume 113 of Lecture Notes in Business Information Processing
    • (2012) Enterprise, Business-Process and Information Systems Modeling , pp. 347-361
    • Raspotnig, C.1    Karpati, P.2    Katta, V.3
  • 66
    • 84858327591 scopus 로고    scopus 로고
    • Supporting failure mode and effect analysis: A case study with failure sequence diagrams
    • B. Regnell, D. Damian, Springer Berlin Heidelberg Volume 7195 of Lecture Notes in Computer Science
    • C. Raspotnig, and A. Opdahl Supporting failure mode and effect analysis: A case study with failure sequence diagrams B. Regnell, D. Damian, Requirements Engineering: Foundation for Software Quality 2012 Springer Berlin Heidelberg 117 131 Volume 7195 of Lecture Notes in Computer Science
    • (2012) Requirements Engineering: Foundation for Software Quality , pp. 117-131
    • Raspotnig, C.1    Opdahl, A.2
  • 67
    • 84864067797 scopus 로고    scopus 로고
    • A goal based methodology for hazop analysis
    • Symbio Community Forum and Harbin Engineering University
    • N. Rossing, M. Lind, N. Jensen, and S. Jrgensen A goal based methodology for hazop analysis Nuclear Safety and Simulation 1 2 2010 134 142 Symbio Community Forum and Harbin Engineering University
    • (2010) Nuclear Safety and Simulation , vol.1 , Issue.2 , pp. 134-142
    • Rossing, N.1    Lind, M.2    Jensen, N.3    Jrgensen, S.4
  • 68
    • 84878255698 scopus 로고    scopus 로고
    • Safety and security interdependencies in complex systems and SoS: Challenges and perspectives
    • O. Hammami, D. Krob, J.L. Voirin, Springer Berlin/Heidelberg
    • S. Sadvandi, N. Chapon, and L. Pitre-Cambacds Safety and security interdependencies in complex systems and SoS: challenges and perspectives O. Hammami, D. Krob, J.L. Voirin, Complex Systems Design and Management 2012 Springer Berlin/Heidelberg 229 241
    • (2012) Complex Systems Design and Management , pp. 229-241
    • Sadvandi, S.1    Chapon, N.2    Pitre-Cambacds, L.3
  • 70
    • 84858317718 scopus 로고    scopus 로고
    • SAM2004 Eurocontrol Safety Assessment Methodology Task Force, 2nd ed
    • SAM2004, 2004. Functional hazard assessment guidance material b1. Eurocontrol Safety Assessment Methodology Task Force, 2nd ed.
    • (2004) Functional Hazard Assessment Guidance Material b1
  • 71
    • 56449123347 scopus 로고    scopus 로고
    • SAM2006 Eurocontrol Safety Assessment Methodology Task Force, 2nd ed
    • SAM2006, 2006. Air navigation safety assessment methodology. Eurocontrol Safety Assessment Methodology Task Force, 2nd ed.
    • (2006) Air Navigation Safety Assessment Methodology
  • 77
    • 84875267907 scopus 로고    scopus 로고
    • Safety and security; Two sides of the same coin: Properties and relations? characteristics to refine? structure of terminology and its perception
    • L. Schnieder, E. Schnieder, and C. Stein Safety and security; two sides of the same coin: properties and relations? characteristics to refine? structure of terminology and its perception 5th Future Security Conference 2010
    • (2010) 5th Future Security Conference
    • Schnieder, L.1    Schnieder, E.2    Stein, C.3
  • 78
    • 38049047671 scopus 로고    scopus 로고
    • Ralyt'e9, J.; Brinkkemper, S.; Henderson-Sellers, B. (Eds.) Situational Method Engineering: Fundamentals and Experiences Springer Boston. volume 244 of IFIP International Federation for Information Processing
    • Sindre, G.; 2007. A look at misuse cases for safety concerns. In: Ralyt'e9, J.; Brinkkemper, S.; Henderson-Sellers, B. (Eds.). Situational Method Engineering: Fundamentals and Experiences. Springer Boston. volume 244 of IFIP International Federation for Information Processing, pp. 252-266.
    • (2007) A look at misuse cases for safety concerns , pp. 252-266
    • Sindre, G.1
  • 79
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering 10 2005 34 44
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 81
    • 35048899397 scopus 로고    scopus 로고
    • Effective security requirements analysis: Hazop and use cases
    • K. Zhang, Y. Zheng, Springer Berlin/Heidelberg Volume 3225 of Lecture Notes in Computer Science
    • T. Srivatanakul, J. Clark, and F. Polack Effective security requirements analysis: Hazop and use cases K. Zhang, Y. Zheng, Information Security 2004 Springer Berlin/Heidelberg 416 427 Volume 3225 of Lecture Notes in Computer Science
    • (2004) Information Security , pp. 416-427
    • Srivatanakul, T.1    Clark, J.2    Polack, F.3
  • 89
    • 0003673547 scopus 로고    scopus 로고
    • 4th ed. Volume 5 of Applied Social Research Methods Series. SAGE Publications
    • Yin, R.; 2008. Case Study Research: Design and Methods, 4th ed. Volume 5 of Applied Social Research Methods Series. SAGE Publications.
    • (2008) Case Study Research: Design and Methods
    • Yin, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.