[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Viehmann et al., 2015 - Google Patents

Risk assessment and security testing of large scale networked systems with RACOMAT

Viehmann et al., 2015

View PDF
Document ID
8587287174590911174
Author
Viehmann J
Werner F
Publication year
Publication venue
Risk Assessment and Risk-Driven Testing: Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers 3

External Links

Snippet

Risk management is an important part of the software quality management because security issues can result in big economical losses and even worse legal consequences. While risk assessment as the base for any risk treatment is widely regarded to be important, doing a …
Continue reading at publica.fraunhofer.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
ben Othmane et al. Extending the agile development process to develop acceptably secure software
Armando et al. The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
Raspotnig et al. Comparing risk identification techniques for safety and security requirements
Geismann et al. A systematic literature review of model-driven security engineering for cyber–physical systems
Ismail et al. A unified framework for cloud security transparency and audit
Baca et al. Countermeasure graphs for software security risk assessment: An action research
Meng et al. Automating the assembly of security assurance case fragments
Vasilevskaya et al. Quantifying risks to data assets using formal metrics in embedded system design
Yue et al. Towards requirements engineering for digital twins of cyber-physical systems
Putra et al. Implementation of DevSecOps by Integrating Static and Dynamic Security Testing in CI/CD Pipelines
Viehmann et al. Risk assessment and security testing of large scale networked systems with RACOMAT
Nami et al. Software trustworthiness: past, present and future
Hortlund Security smells in open-source infrastructure as code scripts: A replication study
Ferry et al. Development and operation of trustworthy smart iot systems: The enact framework
Misra et al. Software design
Zeini et al. Preliminary Investigation into a Security Approach for Infrastructure as Code
Larrucea et al. Managing security debt across PLC phases in a VSE context
Neharika et al. Investigations into Secure IaC Practices
Grossmann et al. A trace management platform for risk-based security testing
Erdogan et al. A systematic method for risk-driven test case design using annotated sequence diagrams
Cheh et al. Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery
Pham et al. Automated software security activities in a continuous delivery pipeline
Heilmann Application Security Review Criteria for DevSecOps Processes
Rhodes et al. Assessing Vulnerabilities in Model-Centric Acquisition Programs: Phase 2
Cordeiro et al. Watch: A validation framework and language for tool qualification