2018
DOI: 10.2495/safe-v8-n1-39-47
|View full text |Cite
|
Sign up to set email alerts
|

Consistency and stability of risk indicators: The case of road infrastructures

Abstract: Over the last decade, the World Road Association -PIARC and several European research projects, among which Ecoroads, have encouraged a promising reflection on risk analysis methods, acceptance criteria and safety practices applied to the road system. The goal of this research activity is the definition of best practice for safety analysis and management to be applied to network TERN (Trans European Road Network).Quantitative Risk Analysis (QRA) provides much information on safety management. Nevertheless, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Ref Subject [1] Trustworthiness attributes and metrics [2] Trustworthy Cyber-Physical Systems [3] Trust based secure cyber physical systems. [4] Trustworthiness requirements for manufacturing cyber-physical systems [5] A hierarchical security architecture for cyber-physical systems [14] Fundamentals of computer security technology [15] Security metrics: replacing fear, uncertainty, and doubt [16] Security content automation protocol (SCAP) [17] Information security and ISO 27001 [18] Safety design concepts for statistical machine learning components [19] Data communication verification for safety goals [20] Safety standard IEC 61508 [21] Safety management fundamentals and Annexes of ICAO safety management [22] Requirements engineering and management [23] Automation standards [24] security in industrial control systems [25] Security safety model [26] Cross-fertilization between safety and security engineering [27] Safety and security of Cyber-physical systems [28] Security requirements analysis [29] Modeling safety and security interdependencies with BDMP [30] The past and Future of Safety Management [31] Calculativeness, trust, and economic organization [32] Concepts and taxonomy of dependable secure computing [33] Aligning cyber-physical system safety and security [34] IT security metrics and measuring security [35] A survey of approaches combining safety and security for industrial control systems [36] Analysis of safe and secure industrial control systems [37] Consistency and stability of risk indicators [38] Safety and security risk assessment in cyber-physical systems [39] An analysis of software quality attributes and trustworthiness [40] Privacy requirements in system design…”
Section: Table 2 List Of Surveyed Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref Subject [1] Trustworthiness attributes and metrics [2] Trustworthy Cyber-Physical Systems [3] Trust based secure cyber physical systems. [4] Trustworthiness requirements for manufacturing cyber-physical systems [5] A hierarchical security architecture for cyber-physical systems [14] Fundamentals of computer security technology [15] Security metrics: replacing fear, uncertainty, and doubt [16] Security content automation protocol (SCAP) [17] Information security and ISO 27001 [18] Safety design concepts for statistical machine learning components [19] Data communication verification for safety goals [20] Safety standard IEC 61508 [21] Safety management fundamentals and Annexes of ICAO safety management [22] Requirements engineering and management [23] Automation standards [24] security in industrial control systems [25] Security safety model [26] Cross-fertilization between safety and security engineering [27] Safety and security of Cyber-physical systems [28] Security requirements analysis [29] Modeling safety and security interdependencies with BDMP [30] The past and Future of Safety Management [31] Calculativeness, trust, and economic organization [32] Concepts and taxonomy of dependable secure computing [33] Aligning cyber-physical system safety and security [34] IT security metrics and measuring security [35] A survey of approaches combining safety and security for industrial control systems [36] Analysis of safe and secure industrial control systems [37] Consistency and stability of risk indicators [38] Safety and security risk assessment in cyber-physical systems [39] An analysis of software quality attributes and trustworthiness [40] Privacy requirements in system design…”
Section: Table 2 List Of Surveyed Papersmentioning
confidence: 99%
“…• According to Amoroso et al, cyber-physical systems can earn users' trust if they enable confidence in meeting a specific set of needs or expectations. [33] Trust based security for CPS Approach for achieving trust, consists external and internal layer of trust with respect to security for CPS [34] Security IT security metrics, measuring security [35] Safety, Security A survey of safety and security methods of ICS [36] Safety, Security Analysis of dynamic software updating techniques, increasing the availability of IS [37] Safety, Risk Analysis…”
Section: Degree Three (Trust Cps)mentioning
confidence: 99%
“…This paper first establishes an evaluation indicator system from three aspects -road capacity, road safety and road vulnerability [16,17]. After multiple screenings, this paper decides to use five indicators, namely traffic density, traffic delay time, number of intersection conflicts, road congestion rate and road accessibility to reflect the surrounding road traffic conditions before and after the opening of a residential community.…”
Section: Road Traffic Evaluation Indicator Systemmentioning
confidence: 99%
“…risks to people, the environment or property) can be addressed according to the scope of the FSA. Risk analysis methods comprise multivariate statistical techniques [2], event tree models [3], fault tree models [4], risk contribution tree models [5], risk matrixes [6], failure mode and effect analyses [7], fishbone diagrams [8] and Bayesian networks [9]. The scope of the FSA, types of hazards identified in step 1, and the level of data available will all influence which method works best for each specific application.…”
Section: Introductionmentioning
confidence: 99%