Last edited by Mautaxe
Saturday, May 16, 2020 | History

3 edition of Security and Safety Requirements for Software-Intensive Systems found in the catalog.

Security and Safety Requirements for Software-Intensive Systems

Donald G. Firesmith

Security and Safety Requirements for Software-Intensive Systems

by Donald G. Firesmith

  • 250 Want to read
  • 6 Currently reading

Published by AUERBACH .
Written in English

    Subjects:
  • Data security & data encryption,
  • Computers,
  • Computers - Languages / Programming,
  • Computer Books: Languages,
  • Programming - Software Development,
  • Computers / Programming / Software Development,
  • Engineering - General,
  • Security - General

  • The Physical Object
    FormatHardcover
    ID Numbers
    Open LibraryOL11816467M
    ISBN 101420045067
    ISBN 109781420045062
    OCLC/WorldCa183917781

    integral safety and security at higher education institutions and the manner in which the institution's management systematically manages integral safety and security (governance). It therefore provides a framework for designing and implementing a management system for integral safety and security in higher education institutions (MISH).File Size: 1MB.   Dependability and Computer Engineering: Concepts for Software-Intensive Systems offers a state-of-the-art overview of the dependability research, from engineering various software-intensive systems to validating existing IT-frameworks and solving generic and particular problems related to the dependable use of IT in our society. It is important.

    Engineering Safety-Related Requirements for Software-Intensive Systems 5 Requirements Engineering Requirements engineering (RE) is the cohesive collection of all tasks that are primarily performed to produce the requirements and other related requirements work products for an endeavor. Today, these RE tasks are typically performed in an iterative, incremental, parallel, and ongoing . Security of Dependable Systems: /ch Security and dependability are crucial for designing trustworthy systems. The approach “security as an Cited by: 2.

    This book constitutes the refereed proceedings of four workshops co-located with SAFECOMP , the 35th International Conference on Computer Safety, Reliability, and Security, held in Trondheim, Norw. Get this from a library! Reliability, Quality and Safety of Software-Intensive Systems: IFIP TC5 WG 3rd International Conference on Reliability, Quality and Safety of Software-Intensive Systems (ENCRESS '97), 29thth May , Athens, Greece. [Dimitris Gritzalis] -- The book includes a number of refereed papers, selected from those presented during the 3rd International Conference on.


Share this book
You might also like
St. Mary Moorfields : baptisms.

St. Mary Moorfields : baptisms.

Technological forecasting and long-range planning

Technological forecasting and long-range planning

Testing in our schools.

Testing in our schools.

Pernilla in the perilous forest

Pernilla in the perilous forest

churchwardens guide

churchwardens guide

Communication by Children and Adults

Communication by Children and Adults

Western redcedar

Western redcedar

New shreds of the old snare

New shreds of the old snare

Dandelion wine

Dandelion wine

From Alexander to Cleopatra

From Alexander to Cleopatra

Front-tracking model for convective transport in flowing ground water

Front-tracking model for convective transport in flowing ground water

TAPPI useful methods, 1991

TAPPI useful methods, 1991

Security and Safety Requirements for Software-Intensive Systems by Donald G. Firesmith Download PDF EPUB FB2

Safety and security are major concerns with most non-trivial software-intensive systems, as hazards and threats raise the risk of accidents and attacks. Because requirements engineers, safety engineers, and security engineers do not know how to collaborate to produce proper safety and security requirements, systems are built with significant vulnerabilities that are difficult and expensive to by: 2.

Safety- and Security-Related Requirements for Software-Intensive Systems One-Day Tutorial 32nd International Conference on Software Engineering 4 May Donald G.

Firesmith Software Engineering Institute Carnegie Mellon University Pittsburgh, PA File Size: KB. Buy Security and Safety Requirements for Software-Intensive Systems by Donald G. Firesmith from Waterstones today. Click and Collect from your local Waterstones or get FREE UK delivery on orders over £Pages:   Engineering Safety and Security Related Requirements for Software Intensive Systems.

Abstract: Many software-intensive systems have significant safety and security ramifications and need to have their associated safety- and security-related requirements properly engineered. It has been observed by several consultants, researchers, and authors that inadequate requirements are a major cause of accidents involving software-intensives systems, and poor security requirements Cited by: Many software-intensive systems have significant safety and security ramifications and need to have their associated safety- and security-related requirements properly engineered.

A comprehensive introduction to the fundamentals of requirements engineering, including techniques for: requirements elicitation and reuse, risk analysis, conflict management, and requirements prioritization; requirements specification, inspection, validation, and verification; traceability management and change control/5(6).

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives.

The tailoring of these products and. Safety and Software Intensive Systems: Challenges Old and New Abstract: There is an increased use of software in safety-critical systems; a trend that is likely to continue in the future.

Although traditional system safety techniques are applicable to software intensive systems, there are Cited by: A System-Theoretic Safety Engineering Approach for Software-Intensive Systems. the security strength of that system is equivalent to the market price of such a vulnerability.

This report was prepared in part under Contract Nos. EDCO/ and EDCO with Westat and ED-OPEC and ED-IESC with INOVAS. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives.

It is, indeed, widely acceptable today that nowhere is it more important to focus on the improvement of software quality than in the case of systems with requirements in the areas of safety and reliability - especially for distributed, real-time and embedded systems. This paper presents a case study for identifying security-safety requirements by using safety analysis techniques.

In order to construct distributed software-intensive safety-critical systems, it is crucial to identify not only the safety requirements, but also the security requirements simultaneously, due to the fact that security attacks on the communication channels could cause safety.

Requirements EngineeringRequirements Engineering the engineering discipline within systems/software engineering concerned with identifying, analyzing, reusing, specifying, managing, verifying, and validating goals and requirements (including safety- and security-related requirements)Safety- and security-related requirements are primarily system.

DoD Guides & Handbooks The DoD Guides and Handbooks listed below are a collection of the most frequently ones used in acquisitions. Acquisitions Architecting Auditing CBA Contracts Cost Estimating DoDAF EVMS Financial Management Glossary Human System Integration Information Security Information Continue Reading→.

Although traditional system safety techniques are applicable to software intensive systems, there are new challenges emerging. In this report we will address four issues we believe will pose challenges in the future. First, the nature of safety is continuing to be widely misunderstood and known system safety techniques are not applied.

Engineering Safety- and Security-Related Requirements for Software-Intensive Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e.

TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Carnegie Mellon University,Software Engineering File Size: 5MB. engineering of safety, security, and survivability requirements upon which the associated architectural mechanisms (e.g., safeguards and countermeasures) should be based.

Safety, security, survivability, and requirements engineers typically use different terminologies and processes that emphasize their differences and obscure their similarities.

Summary form only given. Many software-intensive systems have significant safety ramifications and need to have their associated safety-related requirements properly engineered.

It has been observed by several consultants, researchers, and authors that inadequate requirements are a major cause of accidents involving software-intensive systems. Yet in practice, there is very little interaction.

Home Conferences ICSE Proceedings ICSE COMPANION '07 Engineering Safety and Security Related Requirements for Software Intensive Systems. ARTICLE. Free Access. Engineering Safety and Security Related Requirements for Software Intensive Systems. Share on. Author: Donald G. U.S. Department of Transportation Federal Aviation Administration Independence Avenue, SW Washington, DC () tell-FAA (() ).Because safety requirements are a combination of system-specific safety criteria and a mandatory minimum level of an associated metric, individual safety requirements can have a relatively standard structure based on a safety criterion combined with a minimum metric level.DoD Guides and Handbooks The DoD Guides and Handbooks listed below are a collection of the most frequently ones used in acquisitions.

Acquisitions Architecting Auditing CBA Contracts Cost Estimating DoDAF EVMS Financial Management Glossary Human System Integration Information Security Information Continue Reading→.