2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.17
|View full text |Cite
|
Sign up to set email alerts
|

Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach

Abstract: The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not surprisingly, many research efforts have been devoted to develop risk management frameworks. Among them, Tropos Goal-Risk offers a formal framework for assessing and treating risks on the basis of the likelihood and severity of failures. In this paper, we extend the Tropos Goal-Risk to assess and treat risks by considering the interdepen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
43
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 21 publications
(43 citation statements)
references
References 8 publications
0
43
0
Order By: Relevance
“…It demonstrates how existing proposals can be adopted, integrated and extended in order to support the RE process in a large-scale research project. Section 4 reports the outcome of the application of these various methodologies and processes within the TAS 3 project. Section 5 presents guidelines for performing RE activities in large-scale research projects as we derive them from lessons learned.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It demonstrates how existing proposals can be adopted, integrated and extended in order to support the RE process in a large-scale research project. Section 4 reports the outcome of the application of these various methodologies and processes within the TAS 3 project. Section 5 presents guidelines for performing RE activities in large-scale research projects as we derive them from lessons learned.…”
Section: Introductionmentioning
confidence: 99%
“…Section 2 discusses the challenges of applying RE methodologies to large-scale research-oriented projects. Section 3 presents the RE methodologies and processes applied in the TAS 3 project. In particular, it investigates alternative proposals from researchers as well as industry best practices, for each RE activity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Vulnerable actors take measures to mitigate perceived risks, by using locks on the doors, surveillance cameras, etc. Existing security requirements engineering frameworks focus on various aspects for eliciting security requirements, such as attacker behavior [29,31] and attacker goals [32], design of secure components [15], social aspects [18,11], and events that can cause system failure [1]. However, attacks and consequent security failures often take place because of the exploitation of weaknesses or backdoors within the system.…”
Section: Introductionmentioning
confidence: 99%
“…When the risk of an attack is higher than the risk tolerance of some stakeholder, analysts need to take the adequate measure to mitigate such risks [1]. A countermeasure is a protection mechanism employed to secure the system [30].…”
Section: Introductionmentioning
confidence: 99%