2008 Third International Conference on Risks and Security of Internet and Systems 2008
DOI: 10.1109/crisis.2008.4757468
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of the Dependability, Security Reconfigurability framework

Abstract: Introducing security and security functionality in a large scale Communication and Information System will increase the complexity of these systems. Complexity in general is seen as an important aspect of possible insecure systems. In this paper we describe the threats that need to be addressed if a specific security solution like the DESEREC (Dependability and Security by Enhanced Reconfigurability) framework is deployed in a large scale Communication and Information System. Also the necessary minimal counter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Finally, although not directly related with PbD for the sake of completeness are worth to mention approaches solely focused on either (i) quantitative threat modeling (e.g., in TMAP [19] which quantifies threats related with Commercial Off The Shelf systems -COTS -), (ii) security requirements elicitation methodologies based on risk analysis (e.g., CORAS [14], OCTAVE [20] and ISRAM [21] although they are not embedded into a TMM and -except for ISRAM -do not consider the quantitative aggregation of risks), (iii) rigorous methods for analyzing security specifications (e.g., Weldemariam and Villafiorita [22], [23] where model checking is used to derive security attacks in a e-voting scenario) and, (iv) qualitative methods to elicit security requirements (e.g., DESEREC [24]). …”
Section: Related Workmentioning
confidence: 99%
“…Finally, although not directly related with PbD for the sake of completeness are worth to mention approaches solely focused on either (i) quantitative threat modeling (e.g., in TMAP [19] which quantifies threats related with Commercial Off The Shelf systems -COTS -), (ii) security requirements elicitation methodologies based on risk analysis (e.g., CORAS [14], OCTAVE [20] and ISRAM [21] although they are not embedded into a TMM and -except for ISRAM -do not consider the quantitative aggregation of risks), (iii) rigorous methods for analyzing security specifications (e.g., Weldemariam and Villafiorita [22], [23] where model checking is used to derive security attacks in a e-voting scenario) and, (iv) qualitative methods to elicit security requirements (e.g., DESEREC [24]). …”
Section: Related Workmentioning
confidence: 99%
“…CIS reconfiguration was the highest mechanism for survivability. [33] Incidents were defined as being caused by the sequential occurrence of certain events, be it accidental or deliberate. A CORRELATION of these events defined the existence of an incident, following the implementation of correlation rules.…”
Section: A Behaviour Engines Are Currently Being Used In Wide Varietmentioning
confidence: 99%