Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques
This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneous...
Saved in:
Published in: | 2010 Fifth International Conference on Software Engineering Advances pp. 508 - 513 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English Japanese |
Published: |
IEEE
01-08-2010
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot. |
---|---|
AbstractList | This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot. |
Author | Zhensheng Guo Zeckzer, Dirk Liggesmeyer, Peter Mäckel, Oliver |
Author_xml | – sequence: 1 surname: Zhensheng Guo fullname: Zhensheng Guo email: guo@informatik.uni-kl.de organization: AG Software Eng.: Dependability, Univ. of Kaiserslautern, Kaiserslautern, Germany – sequence: 2 givenname: Dirk surname: Zeckzer fullname: Zeckzer, Dirk email: zeckzer@informatik.uni-kl.de organization: AG Graphische Datenverarbeitung, Univ. of Kaiserslautern, Kaiserslautern, Germany – sequence: 3 givenname: Peter surname: Liggesmeyer fullname: Liggesmeyer, Peter email: peter.liggesmeyer@iese.fraunhofer.de organization: AG Software Eng.: Dependability, Univ. of Kaiserslautern, Kaiserslautern, Germany – sequence: 4 givenname: Oliver surname: Mäckel fullname: Mäckel, Oliver email: mackel.oliver@siemens.com organization: Tech. Risk Manage., Siemens AG, München, Germany |
BookMark | eNotUMtOwzAQNAIkoPTIiYt_IMV2_DxGVYFKFZX64Fo5zoYa2pjGziF_T4DOZWakmdVq7tBVExpA6IGSCaXEPM2n61kxYWTwWl6gsVGaKGkEp5yTyz9POeNcKa3zGzSO8ZMM4ILRnNyir3kFTfK1dzb50OBQ4zW4rvWpz9a2htTjFZw638JxyEVchxanPeBll6ow6FUoQ8Kr4n35hrfRNx_43Coae-ijj3gDbt_4UwfxHl3X9hBhfOYR2j7PNtPXbLF8mU-LReapkCljTnLOtAIDrKQCageOVQCOS1cxcNb8vl6rHDRxzPAy19IqUWqumDWO5SP0-H_XA8Duu_VH2_Y7IakYVsh_APePXDg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICSEA.2010.86 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9780769541440 0769541445 |
EndPage | 513 |
ExternalDocumentID | 5615477 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23 |
IEDL.DBID | RIE |
ISBN | 9781424477883 1424477883 |
IngestDate | Wed Jun 26 19:27:24 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English Japanese |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23 |
PageCount | 6 |
ParticipantIDs | ieee_primary_5615477 |
PublicationCentury | 2000 |
PublicationDate | 2010-08 |
PublicationDateYYYYMMDD | 2010-08-01 |
PublicationDate_xml | – month: 08 year: 2010 text: 2010-08 |
PublicationDecade | 2010 |
PublicationTitle | 2010 Fifth International Conference on Software Engineering Advances |
PublicationTitleAbbrev | icsea |
PublicationYear | 2010 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000452130 ssib026768442 |
Score | 1.5338594 |
Snippet | This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 508 |
SubjectTerms | Analytical models Communication channels Fault trees Hazards integration of security RAVON safety analysis techniques safety requirements Security security analysis techniques security-safety requirements Software |
Title | Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques |
URI | https://ieeexplore.ieee.org/document/5615477 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoJyZALeJbHhgxbR0ndsaqFJWlRU1BbJVjnyWE1CCaDPx7zk7SMrCwOZEcRXdR3p3v3jtCbhWXCJIWmIwFJig8FQzjZMdEUD9TOrGJJwrPMjl_Uw9TL5Nzt-PCAEBoPoN7vwy1fFuYyh-VDRDrYyFlh3RkqmquVvvt8MRXlJo0L_yFBQJTNGy5XBJTvaiVeGqv95qbg6dJNh3XnV6eVv1r0koAmsej_73iMenvGXv0eYdFJ-QANj3yUbNwXXMsRwtHs2ZcHcu0g_KbLsF3Aocjwi3F-JViPEgXVWkLXC-LvCjpcvy6mNPQWkCbXa2SCV21CrDbPnl5nK4mM9YMV2DvmLKVjBuMhDBdghR4PorBGTDcAhiRGMvB6NSbz8kI1NCgC_NIJVrGOaIZ16nh0SnpbooNnBGqcy51okGhb4VwoBKJW2AkdYpPjew56XlDrT9r_Yx1Y6OLv29fksO6Qu-b7K5It_yq4Jp0tra6CR7_AbdGqAw |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8UD3pSA8Zve_DoBLqu3Y4EIRARDEPjjXTtW2JMmJHt4H_va7eBBy-e1jXpsry37H3-fo-Q25BJNJIGPBlwDFBYxD30k1OPO_azUAkjLFB4FMvpW_gwsDQ5dxssDAC45jO4t0tXyzeZLmyqrI22PuBS7pI9vAhZorXqr4cJW1OqAj33H-ZomvxOjeaSGOz5NclTfb9l3WyP-_GgV_Z6WWD1r1krztQMD__3kkektcXs0eeNNTomO7Bqko8Sh5tWiTmapTSuBtZ5sUoh_6ZzsL3ALkm4pujBUvQI6azITYbreZZkOZ33XmdT6poLaHWq5jKhi5oDdt0iL8PBoj_yqvEK3jsGbbnHNPpCGDBBBCzpBpBq0MwAaC60YaBVZMWXSh_CjkYlJn4olAwStGdMRZr5J6SxylZwSqhKmFRCQYja5TyFUEg8Al2pInyqb85I0wpq-VkyaCwrGZ3_vX1D9keLp8lyMp4-XpCDsl5vW-4uSSP_KuCK7K5Nce20_wPAhatd |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Fifth+International+Conference+on+Software+Engineering+Advances&rft.atitle=Identification+of+Security-Safety+Requirements+for+the+Outdoor+Robot+RAVON+Using+Safety+Analysis+Techniques&rft.au=Zhensheng+Guo&rft.au=Zeckzer%2C+Dirk&rft.au=Liggesmeyer%2C+Peter&rft.au=Ma%CC%88ckel%2C+Oliver&rft.date=2010-08-01&rft.pub=IEEE&rft.isbn=9781424477883&rft.spage=508&rft.epage=513&rft_id=info:doi/10.1109%2FICSEA.2010.86&rft.externalDocID=5615477 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424477883/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424477883/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424477883/sc.gif&client=summon&freeimage=true |