2015
DOI: 10.1007/978-3-319-19216-1_37
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Security Assurance Case Based on ISO/IEC 15408

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(5 citation statements)
references
References 6 publications
0
4
0
1
Order By: Relevance
“…At the same time, CubeSat systems, including ground stations, communication signals, and CubeSat spacecraft, are subject to various cyberattacks, the classification of which is given by the standard ISO/IEC 15408 [21]. There are various papers that analyze [22] and propose methods for analyzing CubeSat security threats and solving those, for example, based on the analysis of attack trees [23].…”
Section: Why the Cubesat Software Is Complex To Develop?mentioning
confidence: 99%
“…At the same time, CubeSat systems, including ground stations, communication signals, and CubeSat spacecraft, are subject to various cyberattacks, the classification of which is given by the standard ISO/IEC 15408 [21]. There are various papers that analyze [22] and propose methods for analyzing CubeSat security threats and solving those, for example, based on the analysis of attack trees [23].…”
Section: Why the Cubesat Software Is Complex To Develop?mentioning
confidence: 99%
“…It is advisable to collect and analyze information on various criteria for their inclusion in the general database; • Development of tools and case-oriented methods for assessing the quality of AI, AI systems, and AI platforms [120]. They can be based on general assurance case approaches [121,122] as well as functional and cybersecurity assessment approaches [123] Funding: This research received no external funding.…”
Section: Future Researchmentioning
confidence: 99%
“…Because these methodologies do not consider the operating conditions of the system, they cannot be directly applied to a system, and the assistance of security experts is needed. Some regulations and standards documents for information systems indicate security threats and countermeasures; ISO 27 001, ISO 15 408, and BSI catalogs are typical examples [19][20][21]. ese standards documents provide security countermeasures similar to RG 5.71, but they do not present methods for applying and implementing them.…”
Section: Related Workmentioning
confidence: 99%