2016
DOI: 10.5281/zenodo.47976
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture-Centric Process For Mils Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…The second security analysis where we expect the OSATE Slicer to prove helpful is in the generation of attack trees. Existing tooling for calculating attack trees (Delange et al 2016) has proven difficult to maintain and less robust than desired; this stems in part from the difficulty of calculating reachability directly on the AADL instance model. This corresponds directly to our goal of simplifying model traversal (see Section 1.1.2).…”
Section: Securitymentioning
confidence: 99%
“…The second security analysis where we expect the OSATE Slicer to prove helpful is in the generation of attack trees. Existing tooling for calculating attack trees (Delange et al 2016) has proven difficult to maintain and less robust than desired; this stems in part from the difficulty of calculating reachability directly on the AADL instance model. This corresponds directly to our goal of simplifying model traversal (see Section 1.1.2).…”
Section: Securitymentioning
confidence: 99%