2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.12
|View full text |Cite
|
Sign up to set email alerts
|

Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Security goal indicator trees are implemented in a prototype tool, mentioned in [203]. They are used to formalize security inspection processes for a distributed repository of digital cultural data in e-tourism application in [115]. The formalism is extended to dependability inspection in [128].…”
Section: Security Goal Indicator Treesmentioning
confidence: 99%
See 1 more Smart Citation
“…Security goal indicator trees are implemented in a prototype tool, mentioned in [203]. They are used to formalize security inspection processes for a distributed repository of digital cultural data in e-tourism application in [115]. The formalism is extended to dependability inspection in [128].…”
Section: Security Goal Indicator Treesmentioning
confidence: 99%
“…Thus, they have also become popular in the industrial sector. Notable application domains of graphical models include security analysis of supervisory control and data acquisition (SCADA) systems [43,257,258], voting systems [32,142], vehicular communication systems [4,97], Internet related attacks [148,261], secure software engineering [115], and socio-technical attacks [19,77,220].…”
Section: Introductionmentioning
confidence: 99%