SafeSec Tropos: Joint security and safety requirements elicitation

被引:22
|
作者
Kavallieratos, Georgios [1 ]
Katsikas, Sokratis [1 ,2 ]
Gkioulos, Vasileios [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
[2] Open Univ Cyprus, Sch Pure & Appl Sci, Nicosia, Cyprus
关键词
Security; Safety; Cyber physical systems; Requirements elicitation maritime ecosystem; INTEGRATION;
D O I
10.1016/j.csi.2020.103429
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growing convergence of information technology with operational technology and the accordant proliferation of interconnected cyber-physical systems (CPSs) has given rise to several security and safety challenges. One of these refers to systematically identifying coherent, consistent, and non-conflicting security and safety requirements. This paper proposes an integrated method for safety and security requirements engineering for CPSs at the design stage of the system lifecycle. The method identifies security and safety objectives, it systematically elicits a comprehensive list of requirements, and it links these requirements to objectives, thus facilitating the process of resolving conflicts. To provide insight into the operations of the method, we demonstrate its use to the most vulnerable CPSs on board the Cyber-Enabled Ship (C-ES). By utilizing the proposed method, the safety and security objectives of these systems were defined, and their safety and security requirements were identified.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Security requirements elicitation via weaving scenarios based on security evaluation criteria
    Itoga, Hiroya
    Ohnishi, Atsushi
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
  • [22] Research on Elicitation of Safety Testing Requirements for Airborne Software
    Li Hongbing
    Bao Xiaohong
    Ji Shujuan
    3RD INTERNATIONAL SYMPOSIUM ON AIRCRAFT AIRWORTHINESS (ISAA 2013), 2014, 80 : 303 - 312
  • [23] The integration of safety and security requirements
    Eames, DP
    Moffett, J
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1999, 1698 : 468 - 480
  • [24] Problem-based Elicitation of Security Requirements The ProCOR Method
    Wirtz, Roman
    Heisel, Maritta
    Meis, Rene
    Omerovic, Aida
    Stolen, Ketil
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 26 - 38
  • [25] Argumentation-Based Security Requirements Elicitation: The Next Round
    Ionita, Dan
    Bullee, Jan-Willem
    Wieringa, Roel J.
    2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 7 - 12
  • [26] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation
    Williams, Imano
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
  • [27] A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements
    Hibshi, Hanan
    Jones, Stephanie T.
    Breaux, Travis D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3579 - 3591
  • [28] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE
    Fassbender, Stephan
    Heisel, Maritta
    Meis, Rene
    SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
  • [29] Security Requirements Elicitation Using Method Weaving and Common Criteria
    Saeki, Motoshi
    Kaiya, Haruhiko
    MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
  • [30] Specifying and analyzing early requirements in Tropos
    Fuxman, A
    Liu, L
    Mylopoulos, J
    Pistore, M
    Roveri, M
    Traverso, P
    REQUIREMENTS ENGINEERING, 2004, 9 (02) : 132 - 150