SafeSec Tropos: Joint security and safety requirements elicitation

被引:22
|
作者
Kavallieratos, Georgios [1 ]
Katsikas, Sokratis [1 ,2 ]
Gkioulos, Vasileios [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
[2] Open Univ Cyprus, Sch Pure & Appl Sci, Nicosia, Cyprus
关键词
Security; Safety; Cyber physical systems; Requirements elicitation maritime ecosystem; INTEGRATION;
D O I
10.1016/j.csi.2020.103429
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growing convergence of information technology with operational technology and the accordant proliferation of interconnected cyber-physical systems (CPSs) has given rise to several security and safety challenges. One of these refers to systematically identifying coherent, consistent, and non-conflicting security and safety requirements. This paper proposes an integrated method for safety and security requirements engineering for CPSs at the design stage of the system lifecycle. The method identifies security and safety objectives, it systematically elicits a comprehensive list of requirements, and it links these requirements to objectives, thus facilitating the process of resolving conflicts. To provide insight into the operations of the method, we demonstrate its use to the most vulnerable CPSs on board the Cyber-Enabled Ship (C-ES). By utilizing the proposed method, the safety and security objectives of these systems were defined, and their safety and security requirements were identified.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Requirements model generation to support requirements elicitation: the Secure Tropos experience
    Kiyavitskaya, Nadzeya
    Zannone, Nicola
    AUTOMATED SOFTWARE ENGINEERING, 2008, 15 (02) : 149 - 173
  • [2] Requirements model generation to support requirements elicitation: the Secure Tropos experience
    Nadzeya Kiyavitskaya
    Nicola Zannone
    Automated Software Engineering, 2008, 15 : 149 - 173
  • [3] A Combined Process for Elicitation and Analysis of Safety and Security Requirements
    Raspotnig, Christian
    Karpati, Peter
    Katta, Vikash
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
  • [4] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [5] Safety-Focused Security Requirements Elicitation for Medical Device Software
    Lindvall, Mikael
    Diep, Madeline
    Klein, Michele
    Jones, Paul
    Zhang, Yi
    Vasserman, Eugene
    2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 134 - 143
  • [6] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
  • [7] ELICITATION OF SAFETY REQUIREMENTS FOR PROCESS AUTOMATION
    TOOLA, A
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 1992, 35 (03) : 209 - 215
  • [8] STPA-SafeSec: Safety and security analysis for cyber-physical systems
    Friedberg, Ivo
    McLaughlin, Kieran
    Smith, Paul
    Laverty, David
    Sezer, Sakir
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 183 - 196
  • [9] Security Requirements Elicitation and Assessment Mechanism (SecREAM)
    Goel, Rajat
    Govil, M. C.
    Singh, Girdhari
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
  • [10] Requirements Elicitation and Derivation of Security Policy Templates
    Rudolph, Manuel
    Feth, Denis
    Doerr, Joerg
    Spilker, Joerg
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292