메뉴 건너뛰기




Volumn 5, Issue 2, 2014, Pages 187-204

Model-driven risk analysis of evolving critical infrastructures

Author keywords

ATM; Critical infrastructures; Evolution; Incident preparedness; Interdependencies; Risk analysis; Security

Indexed keywords

ADVANCED TRAFFIC MANAGEMENT SYSTEMS; AIR TRAFFIC CONTROL; AUTOMATIC TELLER MACHINES; CRITICAL INFRASTRUCTURES; RISK ASSESSMENT; RISK MANAGEMENT;

EID: 84897047032     PISSN: 18685137     EISSN: 18685145     Source Type: Journal    
DOI: 10.1007/s12652-013-0179-6     Document Type: Article
Times cited : (14)

References (37)
  • 1
    • 33947420972 scopus 로고    scopus 로고
    • Technical report CMU/SEI-2001-TR-016. Mellon University, Carnegie
    • Alberts CJ, Davey J (2004) OCTAVE criteria version 2. 0. Technical report CMU/SEI-2001-TR-016. Mellon University, Carnegie.
    • (2004) OCTAVE criteria version 2. 0
    • Alberts, C.J.1    Davey, J.2
  • 2
    • 33748419016 scopus 로고    scopus 로고
    • Barrier and operational risk analysis of hydrocarbon releases (BORA-Release). Part I. Method description
    • Aven T, Sklet S, Vinnem JE (2006) Barrier and operational risk analysis of hydrocarbon releases (BORA-Release). Part I. Method description. J Hazard Mater A 137: 681-691.
    • (2006) J Hazard Mater A , vol.137 , pp. 681-691
    • Aven, T.1    Sklet, S.2    Vinnem, J.E.3
  • 3
    • 0001094070 scopus 로고
    • The use of the CCTA risk analysis and management methodology CRAMM in health information systems
    • North-Holland
    • Barber B, Davey J (1992) The use of the CCTA risk analysis and management methodology CRAMM in health information systems. In: 7th international congress on medical informatics (MEDINFO'92), North-Holland, pp 1589-1593.
    • (1992) 7th international congress on medical informatics (MEDINFO'92) , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 5
    • 77956063392 scopus 로고    scopus 로고
    • Modular analysis and modelling of risk scenarios with dependencies
    • Brændeland G, Refsdal A, Stølen K (2010) Modular analysis and modelling of risk scenarios with dependencies. J Syst Softw 83(10): 1995-2013.
    • (2010) J Syst Softw , vol.83 , Issue.10 , pp. 1995-2013
    • Brændeland, G.1    Refsdal, A.2    Stølen, K.3
  • 6
    • 84865619448 scopus 로고    scopus 로고
    • MoVEing forward: towards an architecture and processes for a living models infrastructure
    • Breu M, Breu R, Löw S (2011) MoVEing forward: towards an architecture and processes for a living models infrastructure. Int J Adv Life Sci 3(1-2): 12-22.
    • (2011) Int J Adv Life Sci , vol.3 , Issue.1-2 , pp. 12-22
    • Breu, M.1    Breu, R.2    Löw, S.3
  • 7
    • 79961040256 scopus 로고    scopus 로고
    • A survey on situation-aware ambient intelligence systems
    • Buchmayr M, Kurschl W (2011) A survey on situation-aware ambient intelligence systems. J Ambient Intell Human Comput 2(3): 175-183.
    • (2011) J Ambient Intell Human Comput , vol.2 , Issue.3 , pp. 175-183
    • Buchmayr, M.1    Kurschl, W.2
  • 8
    • 79961040965 scopus 로고    scopus 로고
    • Service oriented computing for ambient Intelligence to support management of transport infrastructures
    • De Amicis R, Conti G, Piffer S, Prandi F (2011) Service oriented computing for Ambient Intelligence to support management of transport infrastructures. J Ambient Intell Human Comput 2(3): 201-211.
    • (2011) J Ambient Intell Human Comput , vol.2 , Issue.3 , pp. 201-211
    • de Amicis, R.1    Conti, G.2    Piffer, S.3    Prandi, F.4
  • 10
    • 84897085760 scopus 로고    scopus 로고
    • Communication from the Commission on a European programme for critical infrastructure protection
    • EU, COM (2006) 786 final
    • EU (2006) Communication from the Commission on a European programme for critical infrastructure protection. The European Commission, COM (2006) 786 final.
    • (2006) The European Commission
  • 15
  • 16
    • 33746764061 scopus 로고
    • IEC. International Electrotechnical Commission
    • IEC (1990) IEC 61025 Fault Tree Analysis (FTA). International Electrotechnical Commission.
    • (1990) IEC 61025 Fault Tree Analysis (FTA)
  • 21
    • 84946150482 scopus 로고    scopus 로고
    • Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services
    • Ligaarden OS, Refsdal A, Stølen K (2012) Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services. In: IT Security Governance Innovations: Theory and Research, IGI Global, pp 256-292.
    • (2012) IT Security Governance Innovations: Theory and Research, IGI Global , pp. 256-292
    • Ligaarden, O.S.1    Refsdal, A.2    Stølen, K.3
  • 22
    • 84897057711 scopus 로고    scopus 로고
    • BRIDGE risk analyzer: a collaborative tool for enhanced risk analysis in crisis situations
    • CEUR Workshop Proceedings (to appear)
    • Lund MS, Refsdal A (2013) BRIDGE risk analyzer: a collaborative tool for enhanced risk analysis in crisis situations. In: Proceedings of the international workshop on AmI for Crisis Management, CEUR Workshop Proceedings (to appear).
    • (2013) Proceedings of the international workshop on AmI for Crisis Management
    • Lund, M.S.1    Refsdal, A.2
  • 23
    • 77953097363 scopus 로고    scopus 로고
    • Evolution in relation to risk and trust management
    • Lund MS, Solhaug B, Stølen K (2010) Evolution in relation to risk and trust management. Computer 43(5): 49-55.
    • (2010) Computer , vol.43 , Issue.5 , pp. 49-55
    • Lund, M.S.1    Solhaug, B.2    Stølen, K.3
  • 27
    • 77649321736 scopus 로고    scopus 로고
    • Microsoft. Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence
    • Microsoft (2006) The security risk management guide. Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence.
    • (2006) The security risk management guide
  • 28
    • 77951478911 scopus 로고    scopus 로고
    • OMG, Superstructure. Version 2. 2. Object Management Group, OMG Document: formal/2009-02-02
    • OMG (2009) OMG Unified Modeling Language (OMG UML), Superstructure. Version 2. 2. Object Management Group, OMG Document: formal/2009-02-02.
    • (2009) OMG Unified Modeling Language (OMG UML)
  • 29
    • 77957994724 scopus 로고    scopus 로고
    • OMG. Version 2. 0. Object Management Group, OMG Document: formal/2011-01-03
    • OMG (2011a) Business process model and notation (BPMN). Version 2. 0. Object Management Group, OMG Document: formal/2011-01-03.
    • (2011) Business process model and notation (BPMN)
  • 33
    • 84897075143 scopus 로고    scopus 로고
    • SecureChange. SecureChange project deliverable D5. 3
    • SecureChange (2011a) Assessment method. SecureChange project deliverable D5. 3.
    • (2011) Assessment method
  • 34
    • 84892411273 scopus 로고    scopus 로고
    • SecureChange. SecureChange project deliverable D4. 4b
    • SecureChange (2011b) Integrability of design modelling solution. SecureChange project deliverable D4. 4b.
    • (2011) Integrability of design modelling solution


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.