Academia.eduAcademia.edu

Outline

From trust to dependability through risk analysis

2007, … Reliability and Security …

Abstract

The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts result in a number of models, frameworks, and methodologies that have been proposed to model and assess the dependability of critical systems. Among them, risk analysis considers the likelihood and severity of failures for evaluating the risk affecting the system.

References (27)

  1. Y. Asnar and P. Giorgini. Modelling and Analysing Risk at Organizational Level. Technical Report DIT-06-063, DIT -University of Trento, September 2006.
  2. Y. Asnar, P. Giorgini, and J. Mylopoulos. Risk Modelling and Reasoning in Goal Models. Technical Report DIT-06-008, DIT -University of Trento, February 2006.
  3. A. Avizienis, J.-C. Laprie, B. Randell, and C. E. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. on Dependable and Sec. Comput., 1(1):11-33, 2004.
  4. T. Bedford and R. Cooke. Probabilistic Risk Analysis: Foundations and Methods. Cambridge University Press, 2001.
  5. R. Butler, J. Maddalon, A. Geser, and C. Muñoz. Simulation and Verification I: Formal Analysis of Air Traffic Management Systems: The Case of Conflict Res- olution and Recovery. In Proc. of the 35th Conf. on Winter Simulation (WSC'03), pages 906-914. IEEE Press, 2003.
  6. S. A. Butler. Security Attribute Evaluation Method: a Cost-Benefit Approach. In Proc. of the Int. Conf. on Software Eng. (ICSE'02), pages 232-240, New York, NY, USA, 2002. ACM Press.
  7. S. Campadello, L. Compagna, D. Gidoin, P. Giorgini, S. Holtmanns, J. Latan- icki, V. Meduri, J.-C. Pazzaglia, M. Seguran, R. Thomas, and N. Zanone. S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium, July 2006. EU-IST-IP 6th Framework Programme -SERENITY 27587.
  8. S. Cox, B. Jones, and D. Collinson. Trust Relations in High-Reliability Organi- zations. Risk Analysis, 26(5):1123-1138, 2006.
  9. R. Falcone and C. Castelfranchi. Social Trust: A Cognitive Approach. In Trust and Deception in Virtual Societies, pages 55-90. Kluwer Academic Publishers, Norwell, MA, USA, 2001.
  10. M. S. Feather. Towards a Unified Approach to the Representation of, and Reason- ing with, Probabilistic Risk Information about Software and its System Interface. In Proc. of IEEE ISSRE'04, pages 391-402. IEEE CS Press, November 2004.
  11. M. S. Feather, S. L. Cornford, K. A. Hicks, and K. R. Johnson. Applications of tool support for risk-informed requirements reasoning. Computer Systems Sci- ence & Engineering.
  12. P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Re- quirements Through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176. IEEE CS Press, 2005.
  13. P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modelling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05, volume 3477 of LNCS, pages 161-176. Springer, 2005.
  14. P. Giorgini, J. Mylopoulos, E. Nicchiarelli, and R. Sebastiani. Formal Reasoning Techniques for Goal Models. Journal of Data Semantics, 1(1):1-20, October 2003.
  15. J. Jacobson. Safety Validation of Dependable Transportation Systems. In Proc. of ITSC'05, pages 1-6, 2005.
  16. S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proc. of the 1997 ACM SIGMOD Int. Conf. on Management of Data, pages 474-485. ACM Press, 1997.
  17. A. Jøsang and S. Presti. Analysing the Relationship Between Risk and Trust. In Proc. of iTrust'04, volume 2995 of LNCS, pages 135-145. Springer, 2004.
  18. S. Lee, R. Gandhi, and G. Ahn. Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems. In Proc. of SREIS'05, 2005.
  19. D. Manchala. Trust Metrics, Models and Protocols for Electronic Commerce Transactions. In Proc. of ICDCS'98, pages 312-321. IEEE CS Press, 1998.
  20. N. Mayer, A. Rifaut, and E. Dubois. Towards a Risk-Based Security Require- ments Engineering Framework. In Proc. of REFSQ'05, 2005.
  21. D. M. Nicol, W. H. Sanders, and K. S. Trivedi. Model-Based Evaluation: From Dependability to Security. IEEE Trans. on Dependable and Sec. Comput., 1(1):48-65, 2004.
  22. D. Shapiro and R. Shachter. User-Agent Value Alignment. In Proc. of The 18th Nat. Conf. on Artif. Intell. AAAI, 2002.
  23. B. Shawn and F. Paul. Multi-Attribute Risk Assessment. Technical Report CMU- CS-01-169, Carnegie Mellon University, December 2001.
  24. I. Sommerville. Software Engineering. Addison Wesley, 7th edition, May 2004.
  25. M. Stamatelatos, W. Vesely, J. Dugan, J. Fragola, J. Minarick, and J. Railsback. Fault Tree Handbook with Aerospace Applications. NASA, 2002.
  26. US-Department of Defense. Department of Defense Information Technolgoy Se- curity Certification and Accreditation Process (DITSCAP) Application Manual, July 2000.
  27. E. Yu. Modelling strategic relationships for process reengineering. PhD thesis, University of Toronto, 1996.