2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2016
DOI: 10.1109/ecai.2016.7861110
|View full text |Cite
|
Sign up to set email alerts
|

Considerations regarding security issues impact on systems availability

Abstract: -Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating the availability of the system based on the security level and achieved availability coefficient (depending on MT… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…3) Integrity: the property that ensures that the information has not been modified in a malicious, accidental, or intentional way by a third party; 4) Authenticity: authentication and integrity usually results in authenticity, which is the guarantee that the information is authentic and comes really from its purported source as it is sent; 5) Non-repudiation: the property that ensures that a stakeholder cannot deny his action, or his partial participation in an action. This results in the fact that one can always establish irrefutable proof of an stakeholder's action; 6) Availability [2]: the property that ensures that the information or service has not ceased to exist in a malicious way.…”
Section: Introductionmentioning
confidence: 99%
“…3) Integrity: the property that ensures that the information has not been modified in a malicious, accidental, or intentional way by a third party; 4) Authenticity: authentication and integrity usually results in authenticity, which is the guarantee that the information is authentic and comes really from its purported source as it is sent; 5) Non-repudiation: the property that ensures that a stakeholder cannot deny his action, or his partial participation in an action. This results in the fact that one can always establish irrefutable proof of an stakeholder's action; 6) Availability [2]: the property that ensures that the information or service has not ceased to exist in a malicious way.…”
Section: Introductionmentioning
confidence: 99%