Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Atle Refsdal"'
Publikováno v:
Business Systems Research : International journal of the Society for Advancing Innovation and Research in Economy
Volume 9
Issue 2
Business Systems Research Journal
Business Systems Research, Vol 9, Iss 2, Pp 55-68 (2018)
Volume 9
Issue 2
Business Systems Research Journal
Business Systems Research, Vol 9, Iss 2, Pp 55-68 (2018)
Background: During major maintenance projects on offshore installations, flotels are often used to accommodate the personnel. A gangway connects the flotel to the installation. If the offshore conditions are unfavorable, the responsible operatives ne
Autor:
Gencer Erdogan, Atle Refsdal
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319766867
CRiSIS
CRiSIS
We present a method for developing qualitative security risk assessment algorithms where the input captures the dynamic state of the target of analysis. This facilitates continuous monitoring. The intended users of the method are security and risk pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b526a8c276757565a49877a8ee7f1ff5
https://doi.org/10.1007/978-3-319-76687-4_17
https://doi.org/10.1007/978-3-319-76687-4_17
Publikováno v:
Graphical Models for Security ISBN: 9783319748597
GraMSec@CSF
GraMSec@CSF
We present a method for developing machine-readable cyber-risk assessment algorithms based on graphical risk models, along with a framework that can automatically collect the input, execute the algorithms, and present the assessment results to a deci
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::272d434d74ae6a6d9a73edeb501b87e3
https://doi.org/10.1007/978-3-319-74860-3_10
https://doi.org/10.1007/978-3-319-74860-3_10
Publikováno v:
QRS
We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available empirical data and expert
Publikováno v:
Formal Aspects of Computing
Having a sequence diagram specification and a computer system, we need to answer the question: Is the system compliant with the sequence diagram specification in the desired way? We present a procedure for answering this question for sequence diagram
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) a
Publikováno v:
DSN
Accidents on petroleum installations can have huge consequences; to mitigate the risk, a number of safety barriers are devised. Faults and unexpected events may cause barriers to temporarily deviate from their nominal state. For safety reasons, a wor
In order to decide whether a software system fulfills a specification, or whether a detailed specification preserves the properties of a more abstract specification, we need an understanding of what it means for one specification to fulfill another s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eec63557cfd90a53bbbd1994d45a1ca0
https://hdl.handle.net/11250/2467705
https://hdl.handle.net/11250/2467705
Publikováno v:
Journal of Systems and Software. 83:1995-2013
The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk sce
Autor:
Jon Olnes, Per Myrseth, Ketil Stølen, Atle Refsdal, Olav Skjelkvale Ligaarden, Tormod Håvaldsrud
Publikováno v:
Electronic Commerce Research. 10:441-467
This paper reports on experiences from using a UML-based method for trust analysis in an industrial project. The overall aim of the trust analysis method is to provide a sound basis for making trust policy decisions. The method makes use of UML seque