Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques

This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneous...

Full description

Saved in:
Bibliographic Details
Published in:2010 Fifth International Conference on Software Engineering Advances pp. 508 - 513
Main Authors: Zhensheng Guo, Zeckzer, Dirk, Liggesmeyer, Peter, Mäckel, Oliver
Format: Conference Proceeding
Language:English
Japanese
Published: IEEE 01-08-2010
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.
AbstractList This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.
Author Zhensheng Guo
Zeckzer, Dirk
Liggesmeyer, Peter
Mäckel, Oliver
Author_xml – sequence: 1
  surname: Zhensheng Guo
  fullname: Zhensheng Guo
  email: guo@informatik.uni-kl.de
  organization: AG Software Eng.: Dependability, Univ. of Kaiserslautern, Kaiserslautern, Germany
– sequence: 2
  givenname: Dirk
  surname: Zeckzer
  fullname: Zeckzer, Dirk
  email: zeckzer@informatik.uni-kl.de
  organization: AG Graphische Datenverarbeitung, Univ. of Kaiserslautern, Kaiserslautern, Germany
– sequence: 3
  givenname: Peter
  surname: Liggesmeyer
  fullname: Liggesmeyer, Peter
  email: peter.liggesmeyer@iese.fraunhofer.de
  organization: AG Software Eng.: Dependability, Univ. of Kaiserslautern, Kaiserslautern, Germany
– sequence: 4
  givenname: Oliver
  surname: Mäckel
  fullname: Mäckel, Oliver
  email: mackel.oliver@siemens.com
  organization: Tech. Risk Manage., Siemens AG, München, Germany
BookMark eNotUMtOwzAQNAIkoPTIiYt_IMV2_DxGVYFKFZX64Fo5zoYa2pjGziF_T4DOZWakmdVq7tBVExpA6IGSCaXEPM2n61kxYWTwWl6gsVGaKGkEp5yTyz9POeNcKa3zGzSO8ZMM4ILRnNyir3kFTfK1dzb50OBQ4zW4rvWpz9a2htTjFZw638JxyEVchxanPeBll6ow6FUoQ8Kr4n35hrfRNx_43Coae-ijj3gDbt_4UwfxHl3X9hBhfOYR2j7PNtPXbLF8mU-LReapkCljTnLOtAIDrKQCageOVQCOS1cxcNb8vl6rHDRxzPAy19IqUWqumDWO5SP0-H_XA8Duu_VH2_Y7IakYVsh_APePXDg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSEA.2010.86
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9780769541440
0769541445
EndPage 513
ExternalDocumentID 5615477
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23
IEDL.DBID RIE
ISBN 9781424477883
1424477883
IngestDate Wed Jun 26 19:27:24 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
Japanese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23
PageCount 6
ParticipantIDs ieee_primary_5615477
PublicationCentury 2000
PublicationDate 2010-08
PublicationDateYYYYMMDD 2010-08-01
PublicationDate_xml – month: 08
  year: 2010
  text: 2010-08
PublicationDecade 2010
PublicationTitle 2010 Fifth International Conference on Software Engineering Advances
PublicationTitleAbbrev icsea
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452130
ssib026768442
Score 1.5338594
Snippet This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed...
SourceID ieee
SourceType Publisher
StartPage 508
SubjectTerms Analytical models
Communication channels
Fault trees
Hazards
integration of security
RAVON
safety analysis techniques
safety requirements
Security
security analysis techniques
security-safety requirements
Software
Title Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques
URI https://ieeexplore.ieee.org/document/5615477
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoJyZALeJbHhgxbR0ndsaqFJWlRU1BbJVjnyWE1CCaDPx7zk7SMrCwOZEcRXdR3p3v3jtCbhWXCJIWmIwFJig8FQzjZMdEUD9TOrGJJwrPMjl_Uw9TL5Nzt-PCAEBoPoN7vwy1fFuYyh-VDRDrYyFlh3RkqmquVvvt8MRXlJo0L_yFBQJTNGy5XBJTvaiVeGqv95qbg6dJNh3XnV6eVv1r0koAmsej_73iMenvGXv0eYdFJ-QANj3yUbNwXXMsRwtHs2ZcHcu0g_KbLsF3Aocjwi3F-JViPEgXVWkLXC-LvCjpcvy6mNPQWkCbXa2SCV21CrDbPnl5nK4mM9YMV2DvmLKVjBuMhDBdghR4PorBGTDcAhiRGMvB6NSbz8kI1NCgC_NIJVrGOaIZ16nh0SnpbooNnBGqcy51okGhb4VwoBKJW2AkdYpPjew56XlDrT9r_Yx1Y6OLv29fksO6Qu-b7K5It_yq4Jp0tra6CR7_AbdGqAw
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8UD3pSA8Zve_DoBLqu3Y4EIRARDEPjjXTtW2JMmJHt4H_va7eBBy-e1jXpsry37H3-fo-Q25BJNJIGPBlwDFBYxD30k1OPO_azUAkjLFB4FMvpW_gwsDQ5dxssDAC45jO4t0tXyzeZLmyqrI22PuBS7pI9vAhZorXqr4cJW1OqAj33H-ZomvxOjeaSGOz5NclTfb9l3WyP-_GgV_Z6WWD1r1krztQMD__3kkektcXs0eeNNTomO7Bqko8Sh5tWiTmapTSuBtZ5sUoh_6ZzsL3ALkm4pujBUvQI6azITYbreZZkOZ33XmdT6poLaHWq5jKhi5oDdt0iL8PBoj_yqvEK3jsGbbnHNPpCGDBBBCzpBpBq0MwAaC60YaBVZMWXSh_CjkYlJn4olAwStGdMRZr5J6SxylZwSqhKmFRCQYja5TyFUEg8Al2pInyqb85I0wpq-VkyaCwrGZ3_vX1D9keLp8lyMp4-XpCDsl5vW-4uSSP_KuCK7K5Nce20_wPAhatd
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Fifth+International+Conference+on+Software+Engineering+Advances&rft.atitle=Identification+of+Security-Safety+Requirements+for+the+Outdoor+Robot+RAVON+Using+Safety+Analysis+Techniques&rft.au=Zhensheng+Guo&rft.au=Zeckzer%2C+Dirk&rft.au=Liggesmeyer%2C+Peter&rft.au=Ma%CC%88ckel%2C+Oliver&rft.date=2010-08-01&rft.pub=IEEE&rft.isbn=9781424477883&rft.spage=508&rft.epage=513&rft_id=info:doi/10.1109%2FICSEA.2010.86&rft.externalDocID=5615477
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424477883/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424477883/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424477883/sc.gif&client=summon&freeimage=true