2012
DOI: 10.1007/978-3-642-33675-1_39
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Assurance by Evidence-Based Argument Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Besides the Claims-Arguments-Evidence (CAE) notation [2], NOR-STA notation [34], and the concrete syntax for SACM [36], the GSN notation [68] is the most prominent graphical syntax for expressing assurance cases. GSN is "a graphical argument-notation which can be used to document explicitly the elements, and the structure of an argument and the argument's relationship to evidence" [68].…”
Section: Goal-structuring Notationmentioning
confidence: 99%
“…Besides the Claims-Arguments-Evidence (CAE) notation [2], NOR-STA notation [34], and the concrete syntax for SACM [36], the GSN notation [68] is the most prominent graphical syntax for expressing assurance cases. GSN is "a graphical argument-notation which can be used to document explicitly the elements, and the structure of an argument and the argument's relationship to evidence" [68].…”
Section: Goal-structuring Notationmentioning
confidence: 99%
“…-Using different types of AC for security: These approaches suggest using different types of assurance cases other than SAC for security assurance. These types are: (i) trust cases, which are based on assurance cases templates derived from the requirements of security standards (Cyra and Gorski 2007); (ii) trustworthiness cases, which focus mainly on addressing users' trust requirements (Górski et al 2012;Mohammadi et al 2018); and (iii) combined safety and security cases (Cockram and Lautieri 2007). This approach combines safety and security principles to create assurance cases with the main goal of achieving acceptable safety.…”
Section: Rq2: Approachesmentioning
confidence: 99%
“…The data sources vary among the validations, as can be seen in Table 14. We categorize these sources into three main categories: -Research, open source, and in-house projects (20) (Ankrum and Kromholz 2005;Chindamaikul et al 2014;Cockram and Lautieri 2007;Coffey et al 2014;Gacek et al 2014;Haley et al 2005;Hawkins et al 2015;Mohammadi et al 2018;Netkachova et al 2015;Patu and Yamamoto 2013a;Poreddy and Corns 2011;Ray and Cleaveland 2015;Rodes et al 2014;Shortt and Weber 2015;Sklyar and Kharchenko 2019;Sljivo and Gallina 2016;Strielkina et al 2018;Tippenhauer et al 2014;Vivas et al 2011;Gallo and Dahab 2015) -Commercial products / systems (9) (Ben Othmane and Ali 2016;Ben Othmane et al 2014;Calinescu et al 2017;Cheah et al 2018;Goodger et al 2012;Górski et al 2012;Masumoto et al 2013;Xu et al 2017;Netkachova et al 2014) -Standards, regulation, and technical reports (7) (Bloomfield et al 2017;Cyra and Gorski 2007;Finnegan and McCaffery 2014b;Fung et al 2018;Graydon and Kelly 2013;He and Johnson 2012;Sklyar and Kharchenko 2017b) SACs were presented in 31 out of the 36 validations. Representing a complete SAC is mostly not possible even in small illustrative cases due to the amount of information required ...…”
Section: Weinstock Et Al (2007)mentioning
confidence: 99%
See 1 more Smart Citation
“…We have used NOR-STA assurance case tool [13] to develop the integrated assurance and confidence arguments. The tool has been developed at Gdańsk University of Technology (GUT) and is using TCL notation (Trust Case Language).…”
Section: Fig 2 General Schema Of Argument Integrationmentioning
confidence: 99%