A Formal Methodology for Procedural Security Assessment

被引:0
|
作者
Weldemariam, Komminist [1 ]
Villafiorita, Adolfo [1 ]
机构
[1] Fdn Bruno Kessler, Ctr Informat Technol, I-38100 Trento, Italy
关键词
procedures; security assessment; modeling and analysis; formal methods;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formal analysis techniques can deliver important support during ICT-based innovation (or redesign) efforts in e-government services. This paper discusses a formal methodology for assessing the procedural security of an organization. We do so by explicitly reasoning on critical information flow named assets flows. With this it is possible to understand how critical assets are modified in unlawful manner, which can trigger security and privacy violations, thereby (automatically) detecting security weaknesses within an organization under evaluation.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [21] Security Risk Assessment Methodology for the petroleum and petrochemical industries
    Moore, David A.
    JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2013, 26 (06) : 1685 - 1689
  • [22] Research on Information Security Asset Value Assessment Methodology
    Yang, Xueqin
    Yang, Peng
    Lin, Honggang
    CYBER SECURITY, CNCERT 2022, 2022, 1699 : 162 - 174
  • [23] Information Security Maturity Level: A Fast Assessment Methodology
    Monteiro, Sergio
    Magalhaes, Joao Paulo
    AMBIENT INTELLIGENCE- SOFTWARE AND APPLICATIONS- 8TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE (ISAMI 2017), 2017, 615 : 269 - 277
  • [24] Steady security assessment using linear programming methodology
    Shukla, M
    Sekar, A
    PROCEEDINGS OF THE THIRTY-SIXTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 141 - 144
  • [25] Security Assessment Methodology for Isolated Systems of a Certain Class
    Wiechecki, Daniel
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (03) : 499 - 505
  • [26] Healthcare Device Security Assessment through Computational Methodology
    Ahmad, Masood
    Al-Amri, Jehad F.
    Subahi, Ahmad F.
    Khatri, Sabita
    Seh, Adil Hussain
    Nadeem, Mohd
    Agrawal, Alka
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 811 - 828
  • [27] Security Assessment Methodology for Industrial Control System Products
    Hristova, Ana
    Schlegel, Roman
    Obermeier, Sebastian
    2014 IEEE 4TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2014, : 264 - 269
  • [28] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
  • [29] Penetration Testing and Security Assessment Methodology for Biomedical Devices
    Kisielewicz, Maciej
    Kedziora, Michal
    Jozwiak, Ireneusz
    RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2024, PT I, 2024, 2144 : 337 - 348
  • [30] Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology
    Howard, Giles
    Butler, Michael
    Colley, John
    Sassone, Vladimiro
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 174 - 180