Normalization of Software Risk Assessment Results in Legal Metrology Based on ISO/IEC 18045 Vulnerability Analysis

被引:0
|
作者
Esche, Marko [1 ]
Salwiczek, Felix [1 ]
Toro, Federico Grasso [2 ]
机构
[1] Phys Tech Bundesanstalt, Abbestr 2-12, D-10587 Berlin, Germany
[2] Fed Inst Metrol METAS, Lindenweg 50, CH-3003 Bern, Switzerland
关键词
D O I
10.15439/2019F84
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Measuring Instruments Directive sets down essential requirements for measuring instruments subject to legal control in the EU. It dictates that a risk assessment must he performed before such instruments are put on the market. Because of the increasing importance of software in measuring instruments, a specifically tailored software risk assessment method has been previously developed and published. Related research has been done on graphical representation of threats by attack probability trees. The final stage is to formalize the method to prove its reproducibility and resilience against the complexity of future instruments. To this end, an inter-institutional comparison of the method is currently being conducted across national metrology institutes, while the weighing equipment manufacturers' association CECIP has provided a new measuring instrument concept, as a significant example of complex instruments. Based on the results of the comparison, a template to formalize the software risk assessment method is proposed here.
引用
收藏
页码:443 / 447
页数:5
相关论文
共 34 条
  • [1] Software Risk Assessment for Measuring Instruments in Legal Metrology
    Esche, Marko
    Thiel, Florian
    [J]. PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 5 : 1113 - 1123
  • [2] Analysis of interrater agreement in ISO/IEC 15504-based software process assessment
    Lee, HY
    Jung, HW
    Chung, CS
    Lee, JM
    Lee, KW
    Jeong, HJ
    [J]. SECOND ASIA-PACIFIC CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2001, : 341 - 348
  • [3] Metrics design for software process assessment based on ISO/IEC 15504
    Hwang, SM
    Yeom, HG
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 909 - 916
  • [4] Analysis of vulnerability assessment results based on CAOS
    Corral, G.
    Garcia-Piquer, A.
    Orriols-Puig, A.
    Fornells, A.
    Golobardes, E.
    [J]. APPLIED SOFT COMPUTING, 2011, 11 (07) : 4321 - 4331
  • [5] Software evaluation by user satisfaction analysis based on quality characteristics of ISO/IEC 9126
    Kwon, W
    Jeon, HR
    Chung, CS
    Shin, S
    Cho, I
    [J]. SERP'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2003, : 610 - 614
  • [6] A Hierarchy of SPI Activities for Software SMEs: Results from ISO/IEC 12207-Based SPI Assessments
    Clarke, Paul
    O'Connor, Rory V.
    Yilmaz, Murat
    [J]. SOFTWARE PROCESS IMPROVEMENT AND CAPABILITY DETERMINATION, 2012, 290 : 62 - +
  • [7] Software Development Process Assessment With MMIS v.2, an ISO/IEC 33000-Based Model
    Rodriguez, Moises
    Verdugo, Javier
    Pino, Francisco
    Delgado, Boris
    Piattini, Mario
    [J]. IT PROFESSIONAL, 2021, 23 (06) : 17 - 23
  • [8] Network Situation Risk Assessment Based on Vulnerability Correlation Analysis
    Nan, Xinmeng
    Chen, Ruiqi
    Tian, Hongtao
    Liu, Yupeng
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2021, : 330 - 334
  • [9] Model-based Application of ISO 26262: The Hazard Analysis and Risk Assessment
    Suerken, Marion
    Peikenkamp, Thomas
    [J]. SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (01): : 114 - 125
  • [10] Flood risk cascade analysis and vulnerability assessment of watershed based on Bayesian network
    Zhang, Wen
    Liu, Gengyuan
    Chiaka, Jeffrey Chiwuikem
    Yang, Zhifeng
    [J]. JOURNAL OF HYDROLOGY, 2023, 626