Proceedings of the 15th International Conference on Availability, Reliability and Security 2020
DOI: 10.1145/3407023.3407033
|View full text |Cite
|
Sign up to set email alerts
|

Security assurance cases for road vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…And even though the standard does not actually identify a specific method to build the case it has a clear objective by conveying that it shall be created to provide the argument for the cybersecurity of the item or component, supported by work products, and that it can be created by combining customer supplier cybersecurity cases but most also support post-development. The standard has a clause focused on operations and maintenance, in this section the relation of prerequisites for post development are relevant, and how it must be used in the instant of delivering updates [26] [27]. Section 6 specifically mentions the need of a cybersecurity case while Section 9 details the concept phase, by (1) defining the operational environment, (2) specifying the cybersecurity goals and claims and (3) specifying the cybersecurity requirements.…”
Section: Methods and Toolsmentioning
confidence: 99%
“…And even though the standard does not actually identify a specific method to build the case it has a clear objective by conveying that it shall be created to provide the argument for the cybersecurity of the item or component, supported by work products, and that it can be created by combining customer supplier cybersecurity cases but most also support post-development. The standard has a clause focused on operations and maintenance, in this section the relation of prerequisites for post development are relevant, and how it must be used in the instant of delivering updates [26] [27]. Section 6 specifically mentions the need of a cybersecurity case while Section 9 details the concept phase, by (1) defining the operational environment, (2) specifying the cybersecurity goals and claims and (3) specifying the cybersecurity requirements.…”
Section: Methods and Toolsmentioning
confidence: 99%
“…In particular, we are interested in whether there are statements that go beyond the intuitive rationale of using SAC "for security assurance". For instance, our initial research (Mohamad et al 2020) indicated that compliance with security standards and regulations is also an important driver. As shown in Table 1, to answer this research question we analyze the surveyed papers and extract two characteristics: assess security level of product or service, obtain certification, .…”
Section: Research Questions and Assessment Criteriamentioning
confidence: 99%
“…Without having an in-depth knowledge of the specific regulation or standard, it is hard to determine whether SACs are explicitly required, or rather just recommended as a way to create a structured argument for security. Incidentally, in our own previous work we have tried to demystify this issue in the context of automotive systems (Mohamad et al 2020). Furthermore, some studies suggest that SACs can be used for evaluating the level of security of a system by assigning measurements to the elements of the cases, e.g., the evidence.…”
Section: Potential For a Wide Range Of Benefitsmentioning
confidence: 99%
See 2 more Smart Citations