2007 IEEE Conference on Technologies for Homeland Security 2007
DOI: 10.1109/ths.2007.370048
|View full text |Cite
|
Sign up to set email alerts
|

Apply STAMP to Critical Infrastructure Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 13 publications
0
15
0
1
Order By: Relevance
“…Another feature of STPA-Sec, which was not covered, is its ability to assist analysts in examining how security constraints might degrade over time. See Leveson and Laracy for more on this topic [7] .…”
Section: Discussionmentioning
confidence: 99%
“…Another feature of STPA-Sec, which was not covered, is its ability to assist analysts in examining how security constraints might degrade over time. See Leveson and Laracy for more on this topic [7] .…”
Section: Discussionmentioning
confidence: 99%
“…SoS capability security may be impacted by operational use or change over time, or from system-level changes to meet individual needs of constituent system stakeholders, changing risk equations that might go unidentified [29]. Security must be designed into the systems with a concious aspect towards how it is operated [30]. Applying security to systems in isolation may lead to incorrect areas of focus for effective security, potentially consuming needed resources [31], and can lead to unidentified areas of threat [9].…”
Section: B System Of Systems and Systems Riskmentioning
confidence: 99%
“…Hierarchically performed hazard origin and propagation studies (HiP-HOPS) was developed as a tool to assess risk throughout a hierarchical system model by integrating functional and classical techniques into a single consistent model [24]. Rather than modeling failures within engineered systems as a result of component failures, the systems-theoretic accident model and processes (STAMP) models the dynamics of the organizational environment to find and redesign inadequate control processes that lead to failure [25][26][27][28]. The function failure identification and propagation method (FFIP) informs assessment by constructing a graph-based behavioral model to take into account the function interactions, dynamics, and joint fault scenarios [8] which has since been extended using flow-state logic to model undesired flow states [29] and dimensional analysis to incorporate more detailed information about component behavior [30] and adapted for large-scale complex systems [31] and mechatronics [32].…”
Section: Introductionmentioning
confidence: 99%