Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study

被引:14
|
作者
Span, Martin, III [1 ]
Mailloux, Logan O. [2 ]
Mills, Robert F. [2 ]
Young, William, Jr. [3 ]
机构
[1] US Air Force Acad, Colorado Springs, CO 80841 USA
[2] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[3] 53rd Elect Warfare Grp, Eglin AFB, FL 32542 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cybersecurity; requirements engineering; security; security engineering; systems engineering; systems security engineering;
D O I
10.1109/ACCESS.2018.2865736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's highly interconnected and technology-reliant environment, cybersecurity is no longer limited to traditional computer systems and IT networks, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes. While numerous vulnerability analysis and architecture analysis approaches are in use, these approaches are often focused on realized systems with limited solution space. A more effective approach for understanding security and resiliency requirements early in the system development is needed. One such approach, system-theoretic process analysis for security (STPA-Sec), addresses the cyber-physical security problem from a systems viewpoint at the conceptual stage when the solution trade-space is largest rather than merely examining components and adding protections during production, operation, or sustainment. This paper uniquely provides a detailed and independent evaluation of STPA-Sec's utility for eliciting, defining, and understanding security and resiliency requirements for a notional next generation aerial refueling platform.
引用
收藏
页码:46668 / 46682
页数:15
相关论文
共 50 条
  • [21] Bow Wave Effect in Aerial Refueling: Computational Analysis and Modeling
    Dogan, Atilla
    Blake, William
    Haag, Christian
    JOURNAL OF AIRCRAFT, 2013, 50 (06): : 1856 - 1868
  • [22] Study on region deploying for aerial refueling mission under threat
    Naval University of Engineering, Wuhan 430033, China
    Xitong Fangzhen Xuebao, 2008, 15 (4194-4197): : 4194 - 4197
  • [23] Conceptual Modeling of Systems Integration Requirements
    Bolloju, Narasimha
    IEEE SOFTWARE, 2009, 26 (05) : 66 - 74
  • [24] Closed-loop motion characteristic requirements of receiver aircraft for probe and drogue aerial refueling
    Wang, Lixin
    Yin, Haipeng
    Guo, Youguang
    Yue, Ting
    Jia, Xiaopeng
    AEROSPACE SCIENCE AND TECHNOLOGY, 2019, 93
  • [25] Holistic security requirements analysis for socio-technical systems
    Li, Tong
    Horkoff, Jennifer
    Mylopoulos, John
    SOFTWARE AND SYSTEMS MODELING, 2018, 17 (04): : 1253 - 1285
  • [26] Holistic security requirements analysis for socio-technical systems
    Tong Li
    Jennifer Horkoff
    John Mylopoulos
    Software & Systems Modeling, 2018, 17 : 1253 - 1285
  • [27] Using Malware Analysis to Improve Security Requirements on Future Systems
    Mead, Nancy R.
    Morales, Jose Andre
    2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 37 - 41
  • [28] The Research and Application of Security Requirements Analysis Methodology of Information Systems
    Cui, Jing-Song
    Zhang, Da
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 30 - 36
  • [29] Systems Security Requirements Analysis for M-Government Transformation
    Al Shamsi, Fatima
    Bamatraf, Sarah
    Rahwan, Talal
    Aung, Zeyar
    Svetinovic, Davor
    2017 XXVI INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND AUTOMATION TECHNOLOGIES (ICAT), 2017,
  • [30] Towards a conceptual foundation for physical security: Case study of an IT department
    Al-Fedaghi S.
    Alsumait O.
    International Journal of Safety and Security Engineering, 2019, 9 (02): : 137 - 156