The Integration of Safety and Security Requirements
This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The req...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 480 |
---|---|
container_issue | |
container_start_page | 468 |
container_title | |
container_volume | |
creator | Eames, David Peter Moffett, Jonathan |
description | This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes. |
doi_str_mv | 10.1007/3-540-48249-0_40 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_1829565</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3072096_46_486</sourcerecordid><originalsourceid>FETCH-LOGICAL-c384t-f6b0637050e73c0dc1a3ae546a509f5f8d9a1026b1a32b24c852f75d2e1a5c7f3</originalsourceid><addsrcrecordid>eNo9UMtuAjEMTJ8qotx73EOvS504ySbHCvWBhFSp0HMUQgLbwi4ky4G_b4CqliXLY8_IHkIeKAwpQPWEpeBQcsW4LsFwuCADXSnM4AnTl6RHJaUlItdX_zMpuVLqmvQAgZW64nhLeloowSiT8o4MUvqGHMgYpbJHcLbyxbjp_DLarm6bog3F1AbfHQrbLIqpd_tY5-bT7_Z19BvfdOme3AS7Tn7wV_vk6_VlNnovJx9v49HzpHSoeFcGOQeJFQjwFTpYOGrResGlFaCDCGqhLQUm5xlnc8ZdPjJUYsE8tcJVAfvk8ay7tcnZdYi2cXUy21hvbDwYqpgWUuS14Xkt5Umz9NHM2_YnGQrmaKRBk30xJ9PM0chMwD_d2O72PnXGHxku_xbt2q3stvMxGYSKgZaG51QSfwG8M27n</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>EBC3072096_46_486</pqid></control><display><type>conference_proceeding</type><title>The Integration of Safety and Security Requirements</title><source>Springer Books</source><creator>Eames, David Peter ; Moffett, Jonathan</creator><contributor>Carbonell, Jaime G ; Siekmann, Jörg ; Goos, Gerhard ; Felici, Massimo ; Kanoun, Karama</contributor><creatorcontrib>Eames, David Peter ; Moffett, Jonathan ; Carbonell, Jaime G ; Siekmann, Jörg ; Goos, Gerhard ; Felici, Massimo ; Kanoun, Karama</creatorcontrib><description>This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540664888</identifier><identifier>ISBN: 3540664882</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540482499</identifier><identifier>EISBN: 3540482490</identifier><identifier>DOI: 10.1007/3-540-48249-0_40</identifier><identifier>OCLC: 958521266</identifier><identifier>LCCallNum: QA76.758QA76.76.O63</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems performance. Reliability ; Exact sciences and technology ; Safety Requirement ; Security Domain ; Security Requirement ; Security Technique ; Software ; Threat Assessment</subject><ispartof>Computer Safety, Reliability and Security, 1999, p.468-480</ispartof><rights>Springer-Verlag Berlin Heidelberg 1999</rights><rights>1999 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c384t-f6b0637050e73c0dc1a3ae546a509f5f8d9a1026b1a32b24c852f75d2e1a5c7f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072096-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-48249-0_40$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-48249-0_40$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4035,4036,27904,38234,41421,42490</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=1829565$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Carbonell, Jaime G</contributor><contributor>Siekmann, Jörg</contributor><contributor>Goos, Gerhard</contributor><contributor>Felici, Massimo</contributor><contributor>Kanoun, Karama</contributor><creatorcontrib>Eames, David Peter</creatorcontrib><creatorcontrib>Moffett, Jonathan</creatorcontrib><title>The Integration of Safety and Security Requirements</title><title>Computer Safety, Reliability and Security</title><description>This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems performance. Reliability</subject><subject>Exact sciences and technology</subject><subject>Safety Requirement</subject><subject>Security Domain</subject><subject>Security Requirement</subject><subject>Security Technique</subject><subject>Software</subject><subject>Threat Assessment</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540664888</isbn><isbn>3540664882</isbn><isbn>9783540482499</isbn><isbn>3540482490</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1999</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo9UMtuAjEMTJ8qotx73EOvS504ySbHCvWBhFSp0HMUQgLbwi4ky4G_b4CqliXLY8_IHkIeKAwpQPWEpeBQcsW4LsFwuCADXSnM4AnTl6RHJaUlItdX_zMpuVLqmvQAgZW64nhLeloowSiT8o4MUvqGHMgYpbJHcLbyxbjp_DLarm6bog3F1AbfHQrbLIqpd_tY5-bT7_Z19BvfdOme3AS7Tn7wV_vk6_VlNnovJx9v49HzpHSoeFcGOQeJFQjwFTpYOGrResGlFaCDCGqhLQUm5xlnc8ZdPjJUYsE8tcJVAfvk8ay7tcnZdYi2cXUy21hvbDwYqpgWUuS14Xkt5Umz9NHM2_YnGQrmaKRBk30xJ9PM0chMwD_d2O72PnXGHxku_xbt2q3stvMxGYSKgZaG51QSfwG8M27n</recordid><startdate>1999</startdate><enddate>1999</enddate><creator>Eames, David Peter</creator><creator>Moffett, Jonathan</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>1999</creationdate><title>The Integration of Safety and Security Requirements</title><author>Eames, David Peter ; Moffett, Jonathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c384t-f6b0637050e73c0dc1a3ae546a509f5f8d9a1026b1a32b24c852f75d2e1a5c7f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1999</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems performance. Reliability</topic><topic>Exact sciences and technology</topic><topic>Safety Requirement</topic><topic>Security Domain</topic><topic>Security Requirement</topic><topic>Security Technique</topic><topic>Software</topic><topic>Threat Assessment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Eames, David Peter</creatorcontrib><creatorcontrib>Moffett, Jonathan</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Eames, David Peter</au><au>Moffett, Jonathan</au><au>Carbonell, Jaime G</au><au>Siekmann, Jörg</au><au>Goos, Gerhard</au><au>Felici, Massimo</au><au>Kanoun, Karama</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The Integration of Safety and Security Requirements</atitle><btitle>Computer Safety, Reliability and Security</btitle><date>1999</date><risdate>1999</risdate><spage>468</spage><epage>480</epage><pages>468-480</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540664888</isbn><isbn>3540664882</isbn><eisbn>9783540482499</eisbn><eisbn>3540482490</eisbn><abstract>This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. The requirements specifications of an Air Traffic Control system are used to highlight the problems inherent in the independent approach to requirements development. From investigation of the literature and the case study, we identify several areas that can cause problems when we attempt to harmonize safety and security requirements techniques. The most important of these are: different system models used for safety and security; different documentation structures for the analyses and their results; the interaction of safety and security requirements; isolation of safety and security requirements processes.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-48249-0_40</doi><oclcid>958521266</oclcid><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Computer Safety, Reliability and Security, 1999, p.468-480 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_1829565 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems performance. Reliability Exact sciences and technology Safety Requirement Security Domain Security Requirement Security Technique Software Threat Assessment |
title | The Integration of Safety and Security Requirements |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T06%3A50%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20Integration%20of%20Safety%20and%20Security%20Requirements&rft.btitle=Computer%20Safety,%20Reliability%20and%20Security&rft.au=Eames,%20David%20Peter&rft.date=1999&rft.spage=468&rft.epage=480&rft.pages=468-480&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540664888&rft.isbn_list=3540664882&rft_id=info:doi/10.1007/3-540-48249-0_40&rft_dat=%3Cproquest_pasca%3EEBC3072096_46_486%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540482499&rft.eisbn_list=3540482490&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072096_46_486&rft_id=info:pmid/&rfr_iscdi=true |