A STAMP-based ontology approach to support safety and security analyses

Journal of Information Security and Applications - Tập 47 - Trang 302-319 - 2019
Daniel Patrick Pereira1, Celso Hirata1, Simin Nadjm-Tehrani2
1Department of Computer Science, ITA Instituto Tecnologico de Aeronautica, Sao Jose dos Campos, Brazil
2Department of Computer and Information Science, Linköping University, Linköping, Sweden

Tài liệu tham khảo

Bloomfield, 2015, Using ontologies to support model-based exploration of the dependencies between causes and consequences of hazards Ebrahimipour, 2011, 2 Elahi, 2009, A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations, 5829, 99 Goluch, 2008, Integration of an ontological information security concept in risk-aware business process management Heerden, 2012, Classifying network attack scenarios using an ontology Herndon, 2012, Flight management computer (FMC) navigation database capacity Herzog, 2007, An ontology of information security, J. Techn. Appl. Adv. Inf. Privacy Secur., 278 Massacci, 2011, An extended ontology for security requirements, 622 Rosa, 2017, A survey of security assessment ontologies, 569 Rosa, 2018, Towards an ontology of security assessment: a core model proposal, 738, 75 Souag, 2015, A security ontology for security requirements elicitation, 8978, 157 Souza, 2018, WebSTAMP: a web application for STPA/ STPA-Sec, 273 Vasilevskaya, 2015 Young, 2014, An integrated approach to safety and security based on systems theory, Commun. ACM, 57, 31, 10.1145/2556938 Zhou, 2017, An ontological interpretation of the hazard concept for safety-critical systems Zhou, 2017, An ontological approach to identify the causes of hazards for safety-critical systems RTCA 2014, Airworthiness Security Process Specification. Radio Technical Commission for Aeronautics (RTCA), ED-202A / DO-326A, Issued 08-06-14, Prepared by SC-216, https://standards.globalspec.com/std/9869201/rtca-do-326A. Ross R, McEvilley M, Oren J. NIST Special Publication 800-160: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, In National Institute of Standards and Technology - U.S. Department of Commernce, November 2016, https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final. National Vulnerability Database, NIST Special Publication 800-53: Security Controls and Assessment Procedures for Federal Information Systems and Organizations, In National Institute of Standards and Technology – U.S. Department of Commerce, https://nvd.nist.gov/800-53. Leveson, 2011