Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study

被引:14
|
作者
Span, Martin, III [1 ]
Mailloux, Logan O. [2 ]
Mills, Robert F. [2 ]
Young, William, Jr. [3 ]
机构
[1] US Air Force Acad, Colorado Springs, CO 80841 USA
[2] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[3] 53rd Elect Warfare Grp, Eglin AFB, FL 32542 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cybersecurity; requirements engineering; security; security engineering; systems engineering; systems security engineering;
D O I
10.1109/ACCESS.2018.2865736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's highly interconnected and technology-reliant environment, cybersecurity is no longer limited to traditional computer systems and IT networks, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes. While numerous vulnerability analysis and architecture analysis approaches are in use, these approaches are often focused on realized systems with limited solution space. A more effective approach for understanding security and resiliency requirements early in the system development is needed. One such approach, system-theoretic process analysis for security (STPA-Sec), addresses the cyber-physical security problem from a systems viewpoint at the conceptual stage when the solution trade-space is largest rather than merely examining components and adding protections during production, operation, or sustainment. This paper uniquely provides a detailed and independent evaluation of STPA-Sec's utility for eliciting, defining, and understanding security and resiliency requirements for a notional next generation aerial refueling platform.
引用
收藏
页码:46668 / 46682
页数:15
相关论文
共 50 条
  • [41] Soft Systems in Requirements Engineering: A Case Study
    Lopez, Alejandra Yepez
    Niu, Nan
    22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 38 - 41
  • [42] Flight Data Analysis and Simulation of Wind Effects During Aerial Refueling
    Dogan, Atilla
    Lewis, Timothy A.
    Blake, William
    JOURNAL OF AIRCRAFT, 2008, 45 (06): : 2036 - 2048
  • [43] A Study on a Multi-controller Design of the Drawtube for Aerial Boom Refueling
    Yuan, D. L.
    Whidborne, J. F.
    Xun, Y. J.
    PROCEEDINGS OF THE 2014 20TH INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC'14), 2014, : 128 - 133
  • [44] Study on the Controllability of A Drogue for Hose-Drogue Aerial Refueling System
    Yuan, Dongli
    Zhao, Tao
    Hou, Xiaolei
    Cheng, Xiaoqin
    Qu, Yaohong
    Yan, Jianguo
    Xing, Xiaojun
    2017 11TH ASIAN CONTROL CONFERENCE (ASCC), 2017, : 2592 - 2595
  • [45] The Security Dilemma: A Conceptual Analysis
    Tang, Shiping
    SECURITY STUDIES, 2009, 18 (03) : 587 - 623
  • [46] A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    CONCEPTUAL MODELING - ER 2009, PROCEEDINGS, 2009, 5829 : 99 - +
  • [47] A Conceptual Framework of Security Requirements in Multi-cloud Environment
    Witti, Hamad
    Guegan, Chirine Ghedira
    Benkhelifa, Elhadj
    SERVICES - SERVICES 2018, 2018, 10975 : 3 - 17
  • [48] Security requirements analysis for large-scale distributed file systems
    Naqvi, Syed
    Poitou, Olivier
    Massonet, Philippe
    Arenas, Alvaro
    Euro-Par 2006 Workshops: Parallel Processing, 2007, 4375 : 49 - 60
  • [49] Teaching for Conceptual Change in Security Awareness A Case Study in Higher Education
    Chan, Yuen-Yan
    Wei, Victor K.
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 68 - 71
  • [50] Security requirements for RFID computing systems
    Zhang, Xiaolan
    King, Brian
    International Journal of Network Security, 2008, 6 (02) : 214 - 226