The Integration of Safety and Security Requirements

This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The req...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Eames, David Peter, Moffett, Jonathan
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 480
container_issue
container_start_page 468
container_title
container_volume
creator Eames, David Peter
Moffett, Jonathan
description This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.
doi_str_mv 10.1007/3-540-48249-0_40
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_1829565</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3072096_46_486</sourcerecordid><originalsourceid>FETCH-LOGICAL-c384t-f6b0637050e73c0dc1a3ae546a509f5f8d9a1026b1a32b24c852f75d2e1a5c7f3</originalsourceid><addsrcrecordid>eNo9UMtuAjEMTJ8qotx73EOvS504ySbHCvWBhFSp0HMUQgLbwi4ky4G_b4CqliXLY8_IHkIeKAwpQPWEpeBQcsW4LsFwuCADXSnM4AnTl6RHJaUlItdX_zMpuVLqmvQAgZW64nhLeloowSiT8o4MUvqGHMgYpbJHcLbyxbjp_DLarm6bog3F1AbfHQrbLIqpd_tY5-bT7_Z19BvfdOme3AS7Tn7wV_vk6_VlNnovJx9v49HzpHSoeFcGOQeJFQjwFTpYOGrResGlFaCDCGqhLQUm5xlnc8ZdPjJUYsE8tcJVAfvk8ay7tcnZdYi2cXUy21hvbDwYqpgWUuS14Xkt5Umz9NHM2_YnGQrmaKRBk30xJ9PM0chMwD_d2O72PnXGHxku_xbt2q3stvMxGYSKgZaG51QSfwG8M27n</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>EBC3072096_46_486</pqid></control><display><type>conference_proceeding</type><title>The Integration of Safety and Security Requirements</title><source>Springer Books</source><creator>Eames, David Peter ; Moffett, Jonathan</creator><contributor>Carbonell, Jaime G ; Siekmann, Jörg ; Goos, Gerhard ; Felici, Massimo ; Kanoun, Karama</contributor><creatorcontrib>Eames, David Peter ; Moffett, Jonathan ; Carbonell, Jaime G ; Siekmann, Jörg ; Goos, Gerhard ; Felici, Massimo ; Kanoun, Karama</creatorcontrib><description>This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540664888</identifier><identifier>ISBN: 3540664882</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540482499</identifier><identifier>EISBN: 3540482490</identifier><identifier>DOI: 10.1007/3-540-48249-0_40</identifier><identifier>OCLC: 958521266</identifier><identifier>LCCallNum: QA76.758QA76.76.O63</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems performance. Reliability ; Exact sciences and technology ; Safety Requirement ; Security Domain ; Security Requirement ; Security Technique ; Software ; Threat Assessment</subject><ispartof>Computer Safety, Reliability and Security, 1999, p.468-480</ispartof><rights>Springer-Verlag Berlin Heidelberg 1999</rights><rights>1999 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c384t-f6b0637050e73c0dc1a3ae546a509f5f8d9a1026b1a32b24c852f75d2e1a5c7f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072096-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-48249-0_40$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-48249-0_40$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4035,4036,27904,38234,41421,42490</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=1829565$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Carbonell, Jaime G</contributor><contributor>Siekmann, Jörg</contributor><contributor>Goos, Gerhard</contributor><contributor>Felici, Massimo</contributor><contributor>Kanoun, Karama</contributor><creatorcontrib>Eames, David Peter</creatorcontrib><creatorcontrib>Moffett, Jonathan</creatorcontrib><title>The Integration of Safety and Security Requirements</title><title>Computer Safety, Reliability and Security</title><description>This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems performance. Reliability</subject><subject>Exact sciences and technology</subject><subject>Safety Requirement</subject><subject>Security Domain</subject><subject>Security Requirement</subject><subject>Security Technique</subject><subject>Software</subject><subject>Threat Assessment</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540664888</isbn><isbn>3540664882</isbn><isbn>9783540482499</isbn><isbn>3540482490</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1999</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo9UMtuAjEMTJ8qotx73EOvS504ySbHCvWBhFSp0HMUQgLbwi4ky4G_b4CqliXLY8_IHkIeKAwpQPWEpeBQcsW4LsFwuCADXSnM4AnTl6RHJaUlItdX_zMpuVLqmvQAgZW64nhLeloowSiT8o4MUvqGHMgYpbJHcLbyxbjp_DLarm6bog3F1AbfHQrbLIqpd_tY5-bT7_Z19BvfdOme3AS7Tn7wV_vk6_VlNnovJx9v49HzpHSoeFcGOQeJFQjwFTpYOGrResGlFaCDCGqhLQUm5xlnc8ZdPjJUYsE8tcJVAfvk8ay7tcnZdYi2cXUy21hvbDwYqpgWUuS14Xkt5Umz9NHM2_YnGQrmaKRBk30xJ9PM0chMwD_d2O72PnXGHxku_xbt2q3stvMxGYSKgZaG51QSfwG8M27n</recordid><startdate>1999</startdate><enddate>1999</enddate><creator>Eames, David Peter</creator><creator>Moffett, Jonathan</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>1999</creationdate><title>The Integration of Safety and Security Requirements</title><author>Eames, David Peter ; Moffett, Jonathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c384t-f6b0637050e73c0dc1a3ae546a509f5f8d9a1026b1a32b24c852f75d2e1a5c7f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems performance. Reliability</topic><topic>Exact sciences and technology</topic><topic>Safety Requirement</topic><topic>Security Domain</topic><topic>Security Requirement</topic><topic>Security Technique</topic><topic>Software</topic><topic>Threat Assessment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Eames, David Peter</creatorcontrib><creatorcontrib>Moffett, Jonathan</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Eames, David Peter</au><au>Moffett, Jonathan</au><au>Carbonell, Jaime G</au><au>Siekmann, Jörg</au><au>Goos, Gerhard</au><au>Felici, Massimo</au><au>Kanoun, Karama</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The Integration of Safety and Security Requirements</atitle><btitle>Computer Safety, Reliability and Security</btitle><date>1999</date><risdate>1999</risdate><spage>468</spage><epage>480</epage><pages>468-480</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540664888</isbn><isbn>3540664882</isbn><eisbn>9783540482499</eisbn><eisbn>3540482490</eisbn><abstract>This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-48249-0_40</doi><oclcid>958521266</oclcid><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Computer Safety, Reliability and Security, 1999, p.468-480
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_1829565
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems performance. Reliability
Exact sciences and technology
Safety Requirement
Security Domain
Security Requirement
Security Technique
Software
Threat Assessment
title The Integration of Safety and Security Requirements
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T06%3A50%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20Integration%20of%20Safety%20and%20Security%20Requirements&rft.btitle=Computer%20Safety,%20Reliability%20and%20Security&rft.au=Eames,%20David%20Peter&rft.date=1999&rft.spage=468&rft.epage=480&rft.pages=468-480&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540664888&rft.isbn_list=3540664882&rft_id=info:doi/10.1007/3-540-48249-0_40&rft_dat=%3Cproquest_pasca%3EEBC3072096_46_486%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540482499&rft.eisbn_list=3540482490&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072096_46_486&rft_id=info:pmid/&rfr_iscdi=true