STAMP-based Approach to Analyze Safety, Security and Data Privacy

被引:5
|
作者
de Souza, Nivio Paula [1 ]
Castro Cesar, Cecilia de Azevedo [1 ]
Bezerra, Juliana de Melo [1 ]
Hirata, Celso Massaki [1 ]
机构
[1] Inst Tecnol Aeronaut, Dept Comp Sci, Sao Jose Dos Campos, Brazil
关键词
STAMP; STPA; safety; security; privacy;
D O I
10.1109/ladc48089.2019.8995717
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security has been of paramount importance to organizations since its lack can result in financial and reputational losses. Privacy is gaining attention because of the increasing legal protection of the right to data privacy. Due to their complexity, in terms of technology, sociology and law, assuring both security and privacy is a major challenge in the development of cyber-physical systems. In general, both security and privacy concerns are addressed by security countermeasures. There is no approach that employs the systems theory model to jointly identify and analyze security and privacy issues. STAMP is a causation model, based on systems theory, that allows analyzing emergent properties in the concept stage of system development. STPA is the tool based on STAMP to analyze safety. STPA has been employed to analyze more recently security. In this work, we propose an approach based on STAMP to analyze safety, security and privacy concerns jointly for cyber-physical systems. The approach uses attributes and threats of security and privacy to identify losses and hazards. We employ the approach in an example of electronic voting system development and we show that the approach is effective in identifying hazardous control actions.
引用
收藏
页码:181 / 190
页数:10
相关论文
共 50 条
  • [21] A STAMP-based Causal Analysis of the Beiyou25 Grounding Accident
    Zhang, J. H.
    Wu, B.
    Zhang, M. Y.
    Yip, T. L.
    2019 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE (PHM-QINGDAO), 2019,
  • [22] A lightweight approach to smart contracts supporting safety, security, and privacy
    Owe, Olaf
    Fazeldehkordi, Elahe
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [23] Privacy and Data Security
    Gaff, Brian M.
    Smedinghoff, Thomas J.
    Sor, Socheth
    COMPUTER, 2012, 45 (03) : 8 - 10
  • [24] A Systematic Approach To Analyze Safety Data Clinical Trial Database
    Legendre, Caroline
    Khromava, Alena
    Carrigan, Gillis
    PHARMACOEPIDEMIOLOGY AND DRUG SAFETY, 2009, 18 : S24 - S25
  • [25] Public concerns and connected and automated vehicles: safety, privacy, and data security
    Dasom Lee
    David J. Hess
    Humanities and Social Sciences Communications, 9
  • [26] Public concerns and connected and automated vehicles: safety, privacy, and data security
    Lee, Dasom
    Hess, David J.
    HUMANITIES & SOCIAL SCIENCES COMMUNICATIONS, 2022, 9 (01):
  • [27] A people & purpose approach to humanitarian data information security and privacy
    Chan, Jennifer
    Bateman, Lauren
    Olafsson, Gisli
    HUMANITARIAN TECHNOLOGY: SCIENCE, SYSTEMS AND GLOBAL IMPACT 2016, HUMTECH2016, 2016, 159 : 3 - 5
  • [28] Automata-Based Approach to Design and Analyze Security Policies
    Krombi, Wadie
    Erradi, Mohammed
    Khoumsi, Ahmed
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 306 - 313
  • [29] A security architecture for data privacy and security
    Weaver, Alfred C.
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 673 - 676
  • [30] Safety, Security and Privacy in Machine Learning Based Internet of Things
    Abbas, Ghulam
    Mehmood, Amjad
    Carsten, Maple
    Epiphaniou, Gregory
    Lloret, Jaime
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)