Dependability and security models

There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Trivedi, K.S., Dong Seong Kim, Roy, A., Medhi, D.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 20
container_issue
container_start_page 11
container_title
container_volume
creator Trivedi, K.S.
Dong Seong Kim
Roy, A.
Medhi, D.
description There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing and security community. In this paper, we present a new classification of dependability and security models. First we present the classification of threats and mitigations in systems and networks. And then we present several individual model types such as availability, confidentiality, integrity, performance, reliability, survivability, safety and maintainability. Finally we show that each model type can be combined and represented by one of the model representation techniques: combinatorial (such as reliability block diagrams (RBD), reliability graphs, fault trees, attack trees), state-space (continuous time Markov chains, stochastic Petri nets, fluid stochastic Petri nets, etc) and hierarchical (e.g., fault trees in the upper level and Markov chains in the lower level). We show case studies for each individual model types as well as composite model types.
doi_str_mv 10.1109/DRCN.2009.5340029
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5340029</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5340029</ieee_id><sourcerecordid>5340029</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-5e6145a6f16a717f96968303bc1cadc69133d94eb6c527821e85ee54d57748573</originalsourceid><addsrcrecordid>eNpFj8FKAzEURSNS0NZ-gLipHzDT95K8JG8pU6tCqSC6LpnkDYxMa5mpi_69FgvezeXA4cJV6hahRASeL96qdakBuCRjATRfqDFabS2BDXz5Dx5GanwSGTwEfaWmw_AJv7FkyPG1ul_IXnY51m3XHo6zuMuzQdJ3f4LtV5ZuuFGjJnaDTM89UR_Lx_fquVi9Pr1UD6siaW0OBYlDS9E16KJH37BjFwyYOmGKOTlGYzJbqV0i7YNGCSRCNpP3NpA3E3X3t9uKyGbft9vYHzfnf-YHFcc_dA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Dependability and security models</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Trivedi, K.S. ; Dong Seong Kim ; Roy, A. ; Medhi, D.</creator><creatorcontrib>Trivedi, K.S. ; Dong Seong Kim ; Roy, A. ; Medhi, D.</creatorcontrib><description>There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing and security community. In this paper, we present a new classification of dependability and security models. First we present the classification of threats and mitigations in systems and networks. And then we present several individual model types such as availability, confidentiality, integrity, performance, reliability, survivability, safety and maintainability. Finally we show that each model type can be combined and represented by one of the model representation techniques: combinatorial (such as reliability block diagrams (RBD), reliability graphs, fault trees, attack trees), state-space (continuous time Markov chains, stochastic Petri nets, fluid stochastic Petri nets, etc) and hierarchical (e.g., fault trees in the upper level and Markov chains in the lower level). We show case studies for each individual model types as well as composite model types.</description><identifier>ISBN: 1424450470</identifier><identifier>ISBN: 9781424450473</identifier><identifier>EISBN: 1424450489</identifier><identifier>EISBN: 9781424450480</identifier><identifier>DOI: 10.1109/DRCN.2009.5340029</identifier><identifier>LCCN: 2009907082</identifier><language>eng</language><publisher>IEEE</publisher><subject>availability ; combinatorial model ; dependability ; hierarchical model ; reliability ; Security ; state-space model ; survivability</subject><ispartof>2009 7th International Workshop on Design of Reliable Communication Networks, 2009, p.11-20</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-5e6145a6f16a717f96968303bc1cadc69133d94eb6c527821e85ee54d57748573</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5340029$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5340029$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Trivedi, K.S.</creatorcontrib><creatorcontrib>Dong Seong Kim</creatorcontrib><creatorcontrib>Roy, A.</creatorcontrib><creatorcontrib>Medhi, D.</creatorcontrib><title>Dependability and security models</title><title>2009 7th International Workshop on Design of Reliable Communication Networks</title><addtitle>DRCN</addtitle><description>There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing and security community. In this paper, we present a new classification of dependability and security models. First we present the classification of threats and mitigations in systems and networks. And then we present several individual model types such as availability, confidentiality, integrity, performance, reliability, survivability, safety and maintainability. Finally we show that each model type can be combined and represented by one of the model representation techniques: combinatorial (such as reliability block diagrams (RBD), reliability graphs, fault trees, attack trees), state-space (continuous time Markov chains, stochastic Petri nets, fluid stochastic Petri nets, etc) and hierarchical (e.g., fault trees in the upper level and Markov chains in the lower level). We show case studies for each individual model types as well as composite model types.</description><subject>availability</subject><subject>combinatorial model</subject><subject>dependability</subject><subject>hierarchical model</subject><subject>reliability</subject><subject>Security</subject><subject>state-space model</subject><subject>survivability</subject><isbn>1424450470</isbn><isbn>9781424450473</isbn><isbn>1424450489</isbn><isbn>9781424450480</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFj8FKAzEURSNS0NZ-gLipHzDT95K8JG8pU6tCqSC6LpnkDYxMa5mpi_69FgvezeXA4cJV6hahRASeL96qdakBuCRjATRfqDFabS2BDXz5Dx5GanwSGTwEfaWmw_AJv7FkyPG1ul_IXnY51m3XHo6zuMuzQdJ3f4LtV5ZuuFGjJnaDTM89UR_Lx_fquVi9Pr1UD6siaW0OBYlDS9E16KJH37BjFwyYOmGKOTlGYzJbqV0i7YNGCSRCNpP3NpA3E3X3t9uKyGbft9vYHzfnf-YHFcc_dA</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Trivedi, K.S.</creator><creator>Dong Seong Kim</creator><creator>Roy, A.</creator><creator>Medhi, D.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200910</creationdate><title>Dependability and security models</title><author>Trivedi, K.S. ; Dong Seong Kim ; Roy, A. ; Medhi, D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-5e6145a6f16a717f96968303bc1cadc69133d94eb6c527821e85ee54d57748573</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>availability</topic><topic>combinatorial model</topic><topic>dependability</topic><topic>hierarchical model</topic><topic>reliability</topic><topic>Security</topic><topic>state-space model</topic><topic>survivability</topic><toplevel>online_resources</toplevel><creatorcontrib>Trivedi, K.S.</creatorcontrib><creatorcontrib>Dong Seong Kim</creatorcontrib><creatorcontrib>Roy, A.</creatorcontrib><creatorcontrib>Medhi, D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Trivedi, K.S.</au><au>Dong Seong Kim</au><au>Roy, A.</au><au>Medhi, D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Dependability and security models</atitle><btitle>2009 7th International Workshop on Design of Reliable Communication Networks</btitle><stitle>DRCN</stitle><date>2009-10</date><risdate>2009</risdate><spage>11</spage><epage>20</epage><pages>11-20</pages><isbn>1424450470</isbn><isbn>9781424450473</isbn><eisbn>1424450489</eisbn><eisbn>9781424450480</eisbn><abstract>There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing and security community. In this paper, we present a new classification of dependability and security models. First we present the classification of threats and mitigations in systems and networks. And then we present several individual model types such as availability, confidentiality, integrity, performance, reliability, survivability, safety and maintainability. Finally we show that each model type can be combined and represented by one of the model representation techniques: combinatorial (such as reliability block diagrams (RBD), reliability graphs, fault trees, attack trees), state-space (continuous time Markov chains, stochastic Petri nets, fluid stochastic Petri nets, etc) and hierarchical (e.g., fault trees in the upper level and Markov chains in the lower level). We show case studies for each individual model types as well as composite model types.</abstract><pub>IEEE</pub><doi>10.1109/DRCN.2009.5340029</doi><tpages>10</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424450470
ispartof 2009 7th International Workshop on Design of Reliable Communication Networks, 2009, p.11-20
issn
language eng
recordid cdi_ieee_primary_5340029
source IEEE Electronic Library (IEL) Conference Proceedings
subjects availability
combinatorial model
dependability
hierarchical model
reliability
Security
state-space model
survivability
title Dependability and security models
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T10%3A53%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Dependability%20and%20security%20models&rft.btitle=2009%207th%20International%20Workshop%20on%20Design%20of%20Reliable%20Communication%20Networks&rft.au=Trivedi,%20K.S.&rft.date=2009-10&rft.spage=11&rft.epage=20&rft.pages=11-20&rft.isbn=1424450470&rft.isbn_list=9781424450473&rft_id=info:doi/10.1109/DRCN.2009.5340029&rft_dat=%3Cieee_6IE%3E5340029%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424450489&rft.eisbn_list=9781424450480&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5340029&rfr_iscdi=true