Loading…

Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques

This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneous...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhensheng Guo, Zeckzer, Dirk, Liggesmeyer, Peter, Mäckel, Oliver
Format: Conference Proceeding
Language:eng ; jpn
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 513
container_issue
container_start_page 508
container_title
container_volume
creator Zhensheng Guo
Zeckzer, Dirk
Liggesmeyer, Peter
Mäckel, Oliver
description This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.
doi_str_mv 10.1109/ICSEA.2010.86
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5615477</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5615477</ieee_id><sourcerecordid>5615477</sourcerecordid><originalsourceid>FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23</originalsourceid><addsrcrecordid>eNotUMtOwzAQNEJIoNIjJy7-gRTb8fMYVQUqVUTqg2vlOGtqaBMaO4f8PQE6l5mRZlarQeiBkhmlxDwt55tFMWNk9FpeoalRmihpBKeck-s_TznjXCmt81s0jfGTjOCC0Zzcoa9lDU0KPjibQtvg1uMNuL4Lacg21kMa8BrOfejgNOYi9m2H0wFw2ae6HfW6rdqE18V7-YZ3MTQf-NIqGnscYoh4C-7QhHMP8R7deHuMML3wBO2eF9v5a7YqX5bzYpUFKmTKmJOcM63AAKuoAO_AsRrAcelqBs6a39e9ykETxwyvci2tEpXmilnjWD5Bj_93AwDsv7twst2wF5KKcYX8B8xCWno</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zhensheng Guo ; Zeckzer, Dirk ; Liggesmeyer, Peter ; Mäckel, Oliver</creator><creatorcontrib>Zhensheng Guo ; Zeckzer, Dirk ; Liggesmeyer, Peter ; Mäckel, Oliver</creatorcontrib><description>This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.</description><identifier>ISBN: 9781424477883</identifier><identifier>ISBN: 1424477883</identifier><identifier>EISBN: 9780769541440</identifier><identifier>EISBN: 0769541445</identifier><identifier>DOI: 10.1109/ICSEA.2010.86</identifier><language>eng ; jpn</language><publisher>IEEE</publisher><subject>Analytical models ; Communication channels ; Fault trees ; Hazards ; integration of security ; RAVON ; safety analysis techniques ; safety requirements ; Security ; security analysis techniques ; security-safety requirements ; Software</subject><ispartof>2010 Fifth International Conference on Software Engineering Advances, 2010, p.508-513</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5615477$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5615477$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhensheng Guo</creatorcontrib><creatorcontrib>Zeckzer, Dirk</creatorcontrib><creatorcontrib>Liggesmeyer, Peter</creatorcontrib><creatorcontrib>Mäckel, Oliver</creatorcontrib><title>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</title><title>2010 Fifth International Conference on Software Engineering Advances</title><addtitle>icsea</addtitle><description>This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.</description><subject>Analytical models</subject><subject>Communication channels</subject><subject>Fault trees</subject><subject>Hazards</subject><subject>integration of security</subject><subject>RAVON</subject><subject>safety analysis techniques</subject><subject>safety requirements</subject><subject>Security</subject><subject>security analysis techniques</subject><subject>security-safety requirements</subject><subject>Software</subject><isbn>9781424477883</isbn><isbn>1424477883</isbn><isbn>9780769541440</isbn><isbn>0769541445</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotUMtOwzAQNEJIoNIjJy7-gRTb8fMYVQUqVUTqg2vlOGtqaBMaO4f8PQE6l5mRZlarQeiBkhmlxDwt55tFMWNk9FpeoalRmihpBKeck-s_TznjXCmt81s0jfGTjOCC0Zzcoa9lDU0KPjibQtvg1uMNuL4Lacg21kMa8BrOfejgNOYi9m2H0wFw2ae6HfW6rdqE18V7-YZ3MTQf-NIqGnscYoh4C-7QhHMP8R7deHuMML3wBO2eF9v5a7YqX5bzYpUFKmTKmJOcM63AAKuoAO_AsRrAcelqBs6a39e9ykETxwyvci2tEpXmilnjWD5Bj_93AwDsv7twst2wF5KKcYX8B8xCWno</recordid><startdate>201008</startdate><enddate>201008</enddate><creator>Zhensheng Guo</creator><creator>Zeckzer, Dirk</creator><creator>Liggesmeyer, Peter</creator><creator>Mäckel, Oliver</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201008</creationdate><title>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</title><author>Zhensheng Guo ; Zeckzer, Dirk ; Liggesmeyer, Peter ; Mäckel, Oliver</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng ; jpn</language><creationdate>2010</creationdate><topic>Analytical models</topic><topic>Communication channels</topic><topic>Fault trees</topic><topic>Hazards</topic><topic>integration of security</topic><topic>RAVON</topic><topic>safety analysis techniques</topic><topic>safety requirements</topic><topic>Security</topic><topic>security analysis techniques</topic><topic>security-safety requirements</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhensheng Guo</creatorcontrib><creatorcontrib>Zeckzer, Dirk</creatorcontrib><creatorcontrib>Liggesmeyer, Peter</creatorcontrib><creatorcontrib>Mäckel, Oliver</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhensheng Guo</au><au>Zeckzer, Dirk</au><au>Liggesmeyer, Peter</au><au>Mäckel, Oliver</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques</atitle><btitle>2010 Fifth International Conference on Software Engineering Advances</btitle><stitle>icsea</stitle><date>2010-08</date><risdate>2010</risdate><spage>508</spage><epage>513</epage><pages>508-513</pages><isbn>9781424477883</isbn><isbn>1424477883</isbn><eisbn>9780769541440</eisbn><eisbn>0769541445</eisbn><abstract>This paper presents a case study for identifying security-safety requirements by using safety analysis techniques. In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety consequences, such as damage to properties or even loss of human lives. Security-safety requirements are proposed for addressing the requirement that describes the safety, security requirements and the influence of the security attacks on safety requirements. Although many safety and security analyses techniques are available for deriving the security-safety requirements separately, no effective approach exists that uses an identical model for identifying integrated security and safety requirements. In this paper, the procedures and lessons learned for deriving integrated security-safety requirements using one identical model that is established by safety analysis techniques are presented. The results from this case study show that the safety analysis techniques are applicable for determining integrated requirements for describing the behavior of an outdoor robot.</abstract><pub>IEEE</pub><doi>10.1109/ICSEA.2010.86</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424477883
ispartof 2010 Fifth International Conference on Software Engineering Advances, 2010, p.508-513
issn
language eng ; jpn
recordid cdi_ieee_primary_5615477
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Analytical models
Communication channels
Fault trees
Hazards
integration of security
RAVON
safety analysis techniques
safety requirements
Security
security analysis techniques
security-safety requirements
Software
title Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A51%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Identification%20of%20Security-Safety%20Requirements%20for%20the%20Outdoor%20Robot%20RAVON%20Using%20Safety%20Analysis%20Techniques&rft.btitle=2010%20Fifth%20International%20Conference%20on%20Software%20Engineering%20Advances&rft.au=Zhensheng%20Guo&rft.date=2010-08&rft.spage=508&rft.epage=513&rft.pages=508-513&rft.isbn=9781424477883&rft.isbn_list=1424477883&rft_id=info:doi/10.1109/ICSEA.2010.86&rft.eisbn=9780769541440&rft.eisbn_list=0769541445&rft_dat=%3Cieee_6IE%3E5615477%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i156t-2c644287e9e2b15efcec2deec46cd2eca92130f73e80c294b386a75b8472a9c23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5615477&rfr_iscdi=true