메뉴 건너뛰기




Volumn 9337, Issue , 2015, Pages 347-361

Quantifying risks to data assets using formal metrics in embedded system design

Author keywords

Attack modelling; Confidentiality loss; Data assets; Embedded systems; Integrity loss; Model based; Security risks; Smart meter; Stochastic modelling

Indexed keywords

EMBEDDED SOFTWARE; RANDOM PROCESSES; RISK ASSESSMENT; SMART METERS; STOCHASTIC MODELS; STOCHASTIC SYSTEMS; SYSTEMS ANALYSIS;

EID: 84969802885     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-24255-2_25     Document Type: Conference Paper
Times cited : (11)

References (24)
  • 2
    • 84969857140 scopus 로고    scopus 로고
    • The SecFutur project: Design of Secure and Energy-efficient Embedded Systems for Future Internet Application
    • The SecFutur project: Design of Secure and Energy-efficient Embedded Systems for Future Internet Application. http://www.secfutur.eu
  • 4
    • 84969905406 scopus 로고    scopus 로고
    • DHS Risk Lexicon. Technical report
    • DHS Risk Lexicon. Technical report, DHS Risk Steering Committee (2010)
    • (2010) DHS Risk Steering Committee
  • 5
    • 84879205852 scopus 로고    scopus 로고
    • A stochastic model of attack process for the evaluation of security metrics
    • (Elsevier)
    • Almasizadeh, J., Azgomi, M.A.: A stochastic model of attack process for the evaluation of security metrics. J. Compt. Networks 57(10), 2159–2180 (2013). (Elsevier)
    • (2013) J. Compt. Networks , vol.57 , Issue.10 , pp. 2159-2180
    • Almasizadeh, J.1    Azgomi, M.A.2
  • 6
    • 84900528864 scopus 로고    scopus 로고
    • Time-dependent analysis of attacks
    • Abadi, M., Kremer, S. (eds.), Springer, Heidelberg
    • Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014 (ETAPS 2014). LNCS, vol. 8414, pp. 285–305. Springer, Heidelberg (2014)
    • (2014) POST 2014 (ETAPS 2014). LNCS , vol.8414 , pp. 285-305
    • Arnold, F.1    Hermanns, H.2    Pulungan, R.3    Stoelinga, M.4
  • 8
    • 0028465894 scopus 로고
    • A characterization of the stochastic process underlying a stochastic Petri net
    • Ciardo, G., German, R., Lindemann, C.: A characterization of the stochastic process underlying a stochastic Petri net. IEEE Trans. Softw. Eng. 20(7), 506–515 (1994)
    • (1994) IEEE Trans. Softw. Eng , vol.20 , Issue.7 , pp. 506-515
    • Ciardo, G.1    German, R.2    Lindemann, C.3
  • 9
    • 84885779641 scopus 로고    scopus 로고
    • Petri net modelling of physical vulnerability
    • Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.), Springer, Heidelberg
    • Flammini, F., Marrone, S., Mazzocca, N., Vittorini, V.: Petri net modelling of physical vulnerability. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 128–139. Springer, Heidelberg (2013)
    • (2013) CRITIS 2011. LNCS , vol.6983 , pp. 128-139
    • Flammini, F.1    Marrone, S.2    Mazzocca, N.3    Vittorini, V.4
  • 11
    • 84892369897 scopus 로고    scopus 로고
    • The COMPLEX methodology for UML/MARTE modeling and sesign space exploration of embedded systems
    • (Elsevier)
    • Herrera, F., Posadas, H., Peñil, P., Villar, E., Ferrero, F., Valencia, R., Palermo, G.: The COMPLEX methodology for UML/MARTE modeling and sesign space exploration of embedded systems. J. Syst. Archit. 60(1), 55–78 (2014). (Elsevier)
    • (2014) J. Syst. Archit , vol.60 , Issue.1 , pp. 55-78
    • Herrera, F.1    Posadas, H.2    Peñil, P.3    Villar, E.4    Ferrero, F.5    Valencia, R.6    Palermo, G.7
  • 14
    • 84927691782 scopus 로고    scopus 로고
    • DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
    • (Elsevier)
    • Kordy, B., Piètre-Cambacèdès, L., Schweitzer, P.: DAG-based attack and defense modeling: don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014). (Elsevier)
    • (2014) Comput. Sci. Rev , vol.13-14 , pp. 1-38
    • Kordy, B.1    Piètre-Cambacèdès, L.2    Schweitzer, P.3
  • 16
    • 1042277255 scopus 로고    scopus 로고
    • A method for modeling and quantifying the security attributes of intrusion tolerant systems
    • (Elsevier)
    • Madan, B.B., Goševa-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Perform. Eval. 56(1–4), 167–186 (2004). (Elsevier)
    • (2004) Perform. Eval , vol.56 , Issue.1-4 , pp. 167-186
    • Madan, B.B.1    Goševa-Popstojanova, K.2    Vaidyanathan, K.3    Trivedi, K.S.4
  • 17
    • 84890495850 scopus 로고    scopus 로고
    • A formal verification framework for SysML activity diagrams
    • Ouchani, S., Mohamed, O., Debbabi, M.: A formal verification framework for SysML activity diagrams. J. Expert Syst. Appl. 41(6), 2713–2728 (2014)
    • (2014) J. Expert Syst. Appl , vol.41 , Issue.6 , pp. 2713-2728
    • Ouchani, S.1    Mohamed, O.2    Debbabi, M.3
  • 18
    • 0030173192 scopus 로고    scopus 로고
    • Current approaches to handling imperfect information in data and knowledge bases
    • Parsons, S.: Current approaches to handling imperfect information in data and knowledge bases. IEEE Trans. Knowl. Data Eng. 8(3), 353–372 (1996)
    • (1996) IEEE Trans. Knowl. Data Eng , vol.8 , Issue.3 , pp. 353-372
    • Parsons, S.1
  • 19
    • 77955417822 scopus 로고    scopus 로고
    • A probabilistic relational model for security risk analysis
    • (Elsevier)
    • Sommestad, T., Ekstedt, M., Johnson, P.: A probabilistic relational model for security risk analysis. Comput. Secur. 29(6), 659–679 (2010). (Elsevier)
    • (2010) Comput. Secur , vol.29 , Issue.6 , pp. 659-679
    • Sommestad, T.1    Ekstedt, M.2    Johnson, P.3
  • 20
    • 1842829828 scopus 로고    scopus 로고
    • SP 800–30. Risk Management Guide for Information Technology Systems
    • Stoneburner, G., Goguen, A.Y., Feringa, A.: SP 800–30. Risk Management Guide for Information Technology Systems. In: NIST (2002)
    • (2002) NIST
    • Stoneburner, G.1    Goguen, A.Y.2    Feringa, A.3
  • 21
    • 84911899842 scopus 로고    scopus 로고
    • Integrating security mechanisms into embedded systems by domain-specific modelling
    • (Wiley)
    • Vasilevskaya, M., Gunawan, L.A., Nadjm-Tehrani, S., Herrmann, P.: Integrating security mechanisms into embedded systems by domain-specific modelling. J. Secur. Commun. Networks 7(12), 2815–2832 (2013). (Wiley)
    • (2013) J. Secur. Commun. Networks , vol.7 , Issue.12 , pp. 2815-2832
    • Vasilevskaya, M.1    Gunawan, L.A.2    Nadjm-Tehrani, S.3    Herrmann, P.4
  • 23
    • 77950875313 scopus 로고    scopus 로고
    • Quantified security is a weak hypothesis: A critical survey of results and assumptions
    • Verendel, V.: Quantified security is a weak hypothesis: a critical survey of results and assumptions. In: New Security Paradigms Workshop. ACM (2009)
    • (2009) New Security Paradigms Workshop. ACM
    • Verendel, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.