2018 International Conference on Frontiers of Information Technology (FIT) 2018
DOI: 10.1109/fit.2018.00062
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements Engineering: A Framework for Cyber-Physical Systems

Abstract: I would firstly like to thank God-Almighty for not only the ability, but also the constant strength and perseverance that kept me going through this thesis.Further, I would like to express my deepest gratitude to my supervisor, Professor Volker Gruhn, who has been a steady guide through the course of my research and has always been supportive of my academic endeavours -no matter which corner of the Earth they led me to -thereby allowing me to interact with and learn from excellent researchers in my field from … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 129 publications
0
4
0
1
Order By: Relevance
“…А также с помощью утилит nmap можно просканировать сеть, порты устройств, протоколы передачи данных между устройствами. Из-за чего существует множество ограничений для более широкого промышленного применения КФС на реальных производствах [15] и [16].…”
Section: рис 6 база данных часть 1 рис 7 база данных частьunclassified
“…А также с помощью утилит nmap можно просканировать сеть, порты устройств, протоколы передачи данных между устройствами. Из-за чего существует множество ограничений для более широкого промышленного применения КФС на реальных производствах [15] и [16].…”
Section: рис 6 база данных часть 1 рис 7 база данных частьunclassified
“…These are annotated in the design model of any system. Other researches developed a security requirements engineering framework for CPSs, that is an extension of SREP [31]. The capacity to support the high variability in the security context though Feature Models appeared in previous papers [23], where the authors study the possible vulnerabilities to create attack scenarios, but not it does not apply to a complex scenario as the CPSs need.…”
Section: Cybersecurity and Feature Model Analysismentioning
confidence: 99%
“…In recent years, security requirements engineering (SRE) has grown, and security frameworks have been proposed in the academic community and other scientific publications (Rehman et al, 2018). There are now various approaches to security requirements engineering, including "Secure Quality Requirements Engineering" SQUARE, CLASP, secure i*, UMLsec , SREP, secure Tropos and MORSE etc.…”
Section: Introductionmentioning
confidence: 99%
“…The use of security requirement assurance is increasing in the development of secure critical systems, especially in industries such as transportation systems, medical devices, financial systems, military systems, healthcare, and automotive (Mohamad et al, 2021). Therefore, one of the primary reasons for the success of the threats and attacks is lack of attention to the elicitation and analysis of security requirements (Anderson, 2020), and cannot be neglected any longer (Rehman et al, 2018). The increasing amount of software security threats, along with increased security awareness, implies that software security assurance is no longer an option, but rather a requirement (Khan & Khan, 2018a).…”
Section: Introductionmentioning
confidence: 99%