2015
DOI: 10.1007/978-3-319-24249-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Safe & Sec Case Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…Alexander et al (2011) provide a discussion on the differences between safety and security both from theoretical, and practical aspects. Other studies combine security and safety assurance by creating combined arguments or security-informed safety arguments (Taguchi et al 2014;Netkachova and Bloomfield 2016;Cockram and Lautieri 2007;Netkachova et al 2015). We have also seen that some studies use different types of assurance cases to argue for security in Section 4.3.…”
Section: Security Might Differ From Safetymentioning
confidence: 98%
See 3 more Smart Citations
“…Alexander et al (2011) provide a discussion on the differences between safety and security both from theoretical, and practical aspects. Other studies combine security and safety assurance by creating combined arguments or security-informed safety arguments (Taguchi et al 2014;Netkachova and Bloomfield 2016;Cockram and Lautieri 2007;Netkachova et al 2015). We have also seen that some studies use different types of assurance cases to argue for security in Section 4.3.…”
Section: Security Might Differ From Safetymentioning
confidence: 98%
“…Six of these create their own argumentation patterns (Finnegan and McCaffery 2014a, b;He and Johnson 2012;Patu and Yamamoto 2013b;Poreddy and Corns 2011;Xu et al 2017). The remaining four include usage of patterns (Hawkins et al 2015;Tippenhauer et al 2014), a guideline for creating and documenting security case patterns (Weinstock et al 2007), and a catalogue of security and safety case patterns (Taguchi et al 2014). Since we we only considered patterns created and used for SAC, we excluded those studies in which patterns are borrowed from the safety domain, e.g., Calinescu et al (2017).…”
Section: Patternsmentioning
confidence: 99%
See 2 more Smart Citations
“…The first paradigm focuses on claims, evidences, and structured arguments which justify how the evidences can satisfy the claims. Techniques in this category include GSN patterns to overcome challenges on how to integrate and harmonize critical issues on safety in addition to security for their systems [17][18][19][20][21]. The second paradigm focuses on building an argument attached to AADL models.…”
Section: Related Workmentioning
confidence: 99%