Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Security critical systems"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
DESSERT
In this paper we propose to apply structured argumentation for Assurance Case methodology to continue developing a concept of licensing for Nuclear Power Plants PostAccident Monitoring System (PAMS) based on Unmanned Aircraft Vehicles (UAVs). We obta
Publikováno v:
28th IEEE International Requirements Engineering Conference
28th IEEE International Requirements Engineering Conference, Aug 2020, Zurich, Switzerland
RE
28th IEEE International Requirements Engineering Conference, Aug 2020, Zurich, Switzerland
RE
International audience; Security-critical systems typically place some requirements on the behaviour of their users, obliging them to follow certain instructions when using those systems. Security vulnerabilities can arise when users do not fully sat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b01fed27e4c7054dc8e29f5e69901683
Autor:
Achim D. Brucker, Burkhart Wolff
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030349677
IFM
IFM
A common problem in the certification of highly safety or security critical systems is the consistency of the certification documentation in general and, in particular, the linking between semi-formal and formal content of the certification documenta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c71d547405b7a70cf126ca4735601a1
https://doi.org/10.1007/978-3-030-34968-4_4
https://doi.org/10.1007/978-3-030-34968-4_4
Publikováno v:
DEStech Transactions on Engineering and Technology Research.
The CORAS approach supports a model-based risk assessment on security critical systems. OPM paradigm integrates the object-oriented, process-oriented, and state transition approaches into a single frame of reference by employing a combination of grap
Autor:
Abdelmalek Benzekri, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, Sravani Teja Bulusu
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319770277
The significance of security requirements in building safety and security critical systems is widely acknowledged. However, given the multitude of security requirements engineering methodologies that exists today, selecting the best suitable methodol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b312a9eddbe3dc87edc82200c2399a82
https://oatao.univ-toulouse.fr/22161/
https://oatao.univ-toulouse.fr/22161/
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Formal Methods for Safety and Security ISBN: 9789811041204
This an introduction to the formal methods perception in the community today. There are many incidents of software failure, and formal methods are advocated as a sure fire solution to the problems. This is however not seen to be so by the majority. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1315a120086acb4167b34728c13609f3
https://doi.org/10.1007/978-981-10-4121-1_1
https://doi.org/10.1007/978-981-10-4121-1_1
Publikováno v:
The Computer Journal. 56:440-463
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies are difficult to express natur
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.