Workflow Engine for Analysis, Certification and Test of Safety and Security-Critical Systems

被引:0
|
作者
Schmittner, Christoph [1 ]
Althammer, Egbert [1 ]
Gruber, Thomas [1 ]
机构
[1] AIT Austrian Inst Technol GmbH, Vienna, Austria
来源
ERCIM NEWS | 2015年 / 102期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Certification and Qualification are important steps for safety-and security-critical systems. In CyberPhysical Systems (CPS), connected Systems of Systems (SoS) and Internet of Things (IoT), safety and security certification should be done in a holistic and unified way. Assurance that a system is safe needs to include evidence that the system is also secure. WEFACT is a workflow tool originally developed for guidance through the safety certification and testing process, which is now extended towards holistic safety and security assurance.
引用
收藏
页码:29 / 30
页数:2
相关论文
共 50 条
  • [1] Reducing Software Assurance Risks for Security-Critical and Safety-Critical Systems
    Axelrod, C. Warren
    2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [2] Scheduling Security-Critical Workflow Tasks in Mobile Edge Computing
    Heng, Huiyu
    Lu, Yifei
    Zhang, Xinyue
    Chi, Yining
    Sun, Jin
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [3] Safety- and Security-Critical Services in Building Automation and Control Systems
    Novak, Thomas
    Gerstinger, Andreas
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (11) : 3614 - 3621
  • [4] Safety-critical and security-critical computing in Britain: An exploration
    MacKenzie, D
    Tierney, M
    TECHNOLOGY ANALYSIS & STRATEGIC MANAGEMENT, 1996, 8 (04) : 355 - 379
  • [5] Criteria for the Analysis of Gaps and Limitations of V&V Methods for Safety-and Security-Critical Systems
    Ferrari, Enrico
    Schlick, Rupert
    De la Vara, Jose Luis
    Folkesson, Peter
    Sangchoolie, Behrooz
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2022 WORKSHOPS, 2022, 13415 : 35 - 46
  • [6] Specification-based test generation for security-critical systems using mutations
    Wimmel, G
    Jürjens, J
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 471 - 482
  • [7] Practical experiences of safety- and security-critical technologies
    Amey, Peter
    Hilton, Adrian J
    Ada User Journal, 2004, 25 (02): : 98 - 105
  • [8] Anticipatory active monitoring for safety- and security-critical software
    Wei Dong
    ChangZhi Zhao
    ShaoXian Shu
    Martin Leucker
    Science China Information Sciences, 2012, 55 : 2723 - 2737
  • [9] Anticipatory active monitoring for safety- and security-critical software
    Dong Wei
    Zhao ChangZhi
    Shu ShaoXian
    Leucker, Martin
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (12) : 2723 - 2737
  • [10] Automated analysis of security-critical JavaScript APIs
    Stanford University, United States
    不详
    Proc. IEEE Symp. Secur. Privacy, (363-378):