کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
459801 696284 2013 28 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Comparing risk identification techniques for safety and security requirements
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Comparing risk identification techniques for safety and security requirements
چکیده انگلیسی

When developing systems where safety and security are important aspects, these aspects have to be given special attention throughout the development, in particular in the requirements phase. There are many similar techniques within the safety and security fields, but few comparisons about what lessons that could be learnt and benefits to be gained. In this paper different techniques for identifying risk, hazard and threat of computer-supported systems are compared. This is done by assessing the techniques’ ability to identify different risks in computer-supported systems in the environment where they operate. The purpose of this paper is therefore to investigate whether and how the techniques can mutually strengthen each other. The result aids practitioners in the selection and combination of techniques and researchers in focusing on gaps between the two fields. Among other things, the findings suggest that many safety techniques enforce a creative and systematic process by applying guide-words and structuring the results in worksheets, while security techniques tend to integrate system models with security models.


► From a literature review we selected both safety and security risk identification techniques.
► We established an assessment framework with dimensions from the techniques.
► A comparison of the techniques shows that they can mutually strengthen each other.
► The safety and security techniques can adopt certain characteristics from each other.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Systems and Software - Volume 86, Issue 4, April 2013, Pages 1124–1151
نویسندگان
, ,