Loading…
Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques
This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneous...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | eng ; jpn |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 513 |
container_issue | |
container_start_page | 508 |
container_title | |
container_volume | |
creator | Zhensheng Guo Zeckzer, Dirk Liggesmeyer, Peter Mäckel, Oliver |
description | This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot. |
doi_str_mv | 10.1109/ICSEA.2010.86 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5615477</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5615477</ieee_id><sourcerecordid>5615477</sourcerecordid><originalsourceid>FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23</originalsourceid><addsrcrecordid>eNotUMtOwzAQNEJIoNIjJy7-gRTb8fMYVQUqVUTqg2vlOGtqaBMaO4f8PQE6l5mRZlarQeiBkhmlxDwt55tFMWNk9FpeoalRmihpBKeck-s_TznjXCmt81s0jfGTjOCC0Zzcoa9lDU0KPjibQtvg1uMNuL4Lacg21kMa8BrOfejgNOYi9m2H0wFw2ae6HfW6rdqE18V7-YZ3MTQf-NIqGnscYoh4C-7QhHMP8R7deHuMML3wBO2eF9v5a7YqX5bzYpUFKmTKmJOcM63AAKuoAO_AsRrAcelqBs6a39e9ykETxwyvci2tEpXmilnjWD5Bj_93AwDsv7twst2wF5KKcYX8B8xCWno</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zhensheng Guo ; Zeckzer, Dirk ; Liggesmeyer, Peter ; Mäckel, Oliver</creator><creatorcontrib>Zhensheng Guo ; Zeckzer, Dirk ; Liggesmeyer, Peter ; Mäckel, Oliver</creatorcontrib><description>This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.</description><identifier>ISBN: 9781424477883</identifier><identifier>ISBN: 1424477883</identifier><identifier>EISBN: 9780769541440</identifier><identifier>EISBN: 0769541445</identifier><identifier>DOI: 10.1109/ICSEA.2010.86</identifier><language>eng ; jpn</language><publisher>IEEE</publisher><subject>Analytical models ; Communication channels ; Fault trees ; Hazards ; integration of security ; RAVON ; safety analysis techniques ; safety requirements ; Security ; security analysis techniques ; security-safety requirements ; Software</subject><ispartof>2010 Fifth International Conference on Software Engineering Advances, 2010, p.508-513</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5615477$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5615477$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhensheng Guo</creatorcontrib><creatorcontrib>Zeckzer, Dirk</creatorcontrib><creatorcontrib>Liggesmeyer, Peter</creatorcontrib><creatorcontrib>Mäckel, Oliver</creatorcontrib><title>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</title><title>2010 Fifth International Conference on Software Engineering Advances</title><addtitle>icsea</addtitle><description>This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.</description><subject>Analytical models</subject><subject>Communication channels</subject><subject>Fault trees</subject><subject>Hazards</subject><subject>integration of security</subject><subject>RAVON</subject><subject>safety analysis techniques</subject><subject>safety requirements</subject><subject>Security</subject><subject>security analysis techniques</subject><subject>security-safety requirements</subject><subject>Software</subject><isbn>9781424477883</isbn><isbn>1424477883</isbn><isbn>9780769541440</isbn><isbn>0769541445</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotUMtOwzAQNEJIoNIjJy7-gRTb8fMYVQUqVUTqg2vlOGtqaBMaO4f8PQE6l5mRZlarQeiBkhmlxDwt55tFMWNk9FpeoalRmihpBKeck-s_TznjXCmt81s0jfGTjOCC0Zzcoa9lDU0KPjibQtvg1uMNuL4Lacg21kMa8BrOfejgNOYi9m2H0wFw2ae6HfW6rdqE18V7-YZ3MTQf-NIqGnscYoh4C-7QhHMP8R7deHuMML3wBO2eF9v5a7YqX5bzYpUFKmTKmJOcM63AAKuoAO_AsRrAcelqBs6a39e9ykETxwyvci2tEpXmilnjWD5Bj_93AwDsv7twst2wF5KKcYX8B8xCWno</recordid><startdate>201008</startdate><enddate>201008</enddate><creator>Zhensheng Guo</creator><creator>Zeckzer, Dirk</creator><creator>Liggesmeyer, Peter</creator><creator>Mäckel, Oliver</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201008</creationdate><title>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</title><author>Zhensheng Guo ; Zeckzer, Dirk ; Liggesmeyer, Peter ; Mäckel, Oliver</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng ; jpn</language><creationdate>2010</creationdate><topic>Analytical models</topic><topic>Communication channels</topic><topic>Fault trees</topic><topic>Hazards</topic><topic>integration of security</topic><topic>RAVON</topic><topic>safety analysis techniques</topic><topic>safety requirements</topic><topic>Security</topic><topic>security analysis techniques</topic><topic>security-safety requirements</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhensheng Guo</creatorcontrib><creatorcontrib>Zeckzer, Dirk</creatorcontrib><creatorcontrib>Liggesmeyer, Peter</creatorcontrib><creatorcontrib>Mäckel, Oliver</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhensheng Guo</au><au>Zeckzer, Dirk</au><au>Liggesmeyer, Peter</au><au>Mäckel, Oliver</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</atitle><btitle>2010 Fifth International Conference on Software Engineering Advances</btitle><stitle>icsea</stitle><date>2010-08</date><risdate>2010</risdate><spage>508</spage><epage>513</epage><pages>508-513</pages><isbn>9781424477883</isbn><isbn>1424477883</isbn><eisbn>9780769541440</eisbn><eisbn>0769541445</eisbn><abstract>This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.</abstract><pub>IEEE</pub><doi>10.1109/ICSEA.2010.86</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424477883 |
ispartof | 2010 Fifth International Conference on Software Engineering Advances, 2010, p.508-513 |
issn | |
language | eng ; jpn |
recordid | cdi_ieee_primary_5615477 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Analytical models Communication channels Fault trees Hazards integration of security RAVON safety analysis techniques safety requirements Security security analysis techniques security-safety requirements Software |
title | Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A51%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Identification%20of%20Security-Safety%20Requirements%20for%20the%20Outdoor%20Robot%20RAVON%20Using%20Safety%20Analysis%20Techniques&rft.btitle=2010%20Fifth%20International%20Conference%20on%20Software%20Engineering%20Advances&rft.au=Zhensheng%20Guo&rft.date=2010-08&rft.spage=508&rft.epage=513&rft.pages=508-513&rft.isbn=9781424477883&rft.isbn_list=1424477883&rft_id=info:doi/10.1109/ICSEA.2010.86&rft.eisbn=9780769541440&rft.eisbn_list=0769541445&rft_dat=%3Cieee_6IE%3E5615477%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5615477&rfr_iscdi=true |