A Formal Methodology for Procedural Security Assessment

被引:0
|
作者
Weldemariam, Komminist [1 ]
Villafiorita, Adolfo [1 ]
机构
[1] Fdn Bruno Kessler, Ctr Informat Technol, I-38100 Trento, Italy
关键词
procedures; security assessment; modeling and analysis; formal methods;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formal analysis techniques can deliver important support during ICT-based innovation (or redesign) efforts in e-government services. This paper discusses a formal methodology for assessing the procedural security of an organization. We do so by explicitly reasoning on critical information flow named assets flows. With this it is possible to understand how critical assets are modified in unlawful manner, which can trigger security and privacy violations, thereby (automatically) detecting security weaknesses within an organization under evaluation.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [41] Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology
    Jung, Daun
    Shin, Jiho
    Lee, Chaechang
    Kwon, Kookheui
    Seo, Jung Taek
    IEEE ACCESS, 2023, 11 : 15229 - 15241
  • [42] A MANUFACTURER-SPECIFIC SECURITY ASSESSMENT METHODOLOGY FOR CRITICAL INFRASTRUCTURE COMPONENTS
    Brandstetter, Thomas
    Knorr, Konstantin
    Rosenbaum, Ute
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 229 - +
  • [43] A methodology to evaluate the uncertainties used to perform security assessment for branch overloads
    Vasconcelos, M. H.
    Goncalves, C.
    Meirinhos, J.
    Omont, N.
    Pitto, A.
    Ceresa, G.
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 112 : 169 - 177
  • [44] A Practical Security Assessment Methodology for Power System Operations Considering Uncertainty
    Nguyen, Nhi Thi Ai
    Le, Dinh Duong
    Ngo, Van Duong
    Pham, Van Kien
    Huynh, Van Ky
    ELECTRONICS, 2024, 13 (15)
  • [45] RFID System Security Assessment Methodology Based on Attack Graph Model
    Yang, Xiaoming
    Wang, Jiahao
    Huang, Yifu
    Qin, Zhiguang
    PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166
  • [46] An advanced methodology for steady-state security assessment of power systems
    Popovic, DP
    Dobrijevic, DM
    Mijuskovic, NA
    Vlaisavljevic, DJ
    EUROPEAN TRANSACTIONS ON ELECTRICAL POWER, 2001, 11 (04): : 227 - 233
  • [47] Prioritization methodology of computing assets for connected vehicles in security assessment purpose
    Barinov, Andrey
    Davydkin, Nikolay
    Sharova, Daria
    Skurlaev, Sergey
    2019 12TH CMI CONFERENCE ON CYBERSECURITY AND PRIVACY (CMI), 2019, : 58 - 63
  • [48] A model-based methodology to support systems security design and assessment
    Shaked, Avi
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2023, 33
  • [49] Procedural Experimentation and National Security in the Courts
    Sinnar, Shirin
    CALIFORNIA LAW REVIEW, 2018, 106 (04) : 991 - 1060
  • [50] THE PROCEDURAL EXCEPTIONALISM OF NATIONAL SECURITY SECRECY
    Kwoka, Margaret B.
    BOSTON UNIVERSITY LAW REVIEW, 2017, 97 (01) : 103 - 165