scholarly journals Combined Assessment of Software Safety and Security Requirements

2018 ◽  
Vol 20 (1) ◽  
pp. 46-69 ◽  
Author(s):  
Christian Raspotnig ◽  
Peter Karpati ◽  
Andreas L Opdahl

Safety is a fundamental concern in modern society, and security is a precondition for safety. Ensuring safety and security of complex integrated systems requires a coordinated approach that involve different stakeholder groups going beyond safety and security experts and system developers. The authors have therefore proposed CHASSIS (Combined Harm Assessment of Safety and Security for Information Systems), a method for collaborative determination of requirements for safe and secure systems. In this article, the authors evaluate CHASSIS through industrial case studies of two small-to-medium sized suppliers to the air-traffic management (ATM) sector. The results suggest that CHASSIS is easy to use, and that handling safety and security together provides benefits because techniques, information, and knowledge can be reused. The authors conclude that further exploration and development of CHASSIS is worthwhile, but that better documentation is needed—including more detailed process guidelines—to support elicitation of security and safety requirements and to systematically relate them to functional requirements.

Author(s):  
Christian Raspotnig ◽  
Peter Karpati ◽  
Andreas L Opdahl

Safety is a fundamental concern in modern society, and security is a precondition for safety. Ensuring safety and security of complex integrated systems requires a coordinated approach that involve different stakeholder groups going beyond safety and security experts and system developers. The authors have therefore proposed CHASSIS (Combined Harm Assessment of Safety and Security for Information Systems), a method for collaborative determination of requirements for safe and secure systems. In this article, the authors evaluate CHASSIS through industrial case studies of two small-to-medium sized suppliers to the air-traffic management (ATM) sector. The results suggest that CHASSIS is easy to use, and that handling safety and security together provides benefits because techniques, information, and knowledge can be reused. The authors conclude that further exploration and development of CHASSIS is worthwhile, but that better documentation is needed—including more detailed process guidelines—to support elicitation of security and safety requirements and to systematically relate them to functional requirements.


Author(s):  
Akram AbdelKarim AbdelQader

Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the security requirement based on RSS dataset.  The using of SVM will enhance the overall process of evaluating the security requirements. The results show a significant enhancement in security improvements.


2009 ◽  
Vol 1 (3) ◽  
pp. 171-178 ◽  
Author(s):  
Helmut Essen ◽  
Manfred Hägelen ◽  
Alfred Wahlen ◽  
Karsten Schulz ◽  
Klaus Jäger ◽  
...  

The capabilities of millimeter wave radars have been demonstrated for a long period of time for missile seeker applications and for automotive radars. The technological advantages of this type of radar can be adapted to security applications in air traffic management at short and medium range as well as on the ground. The application discussed in this paper focuses on inverse synthetic aperture radar (ISAR) imaging techniques for the derivation of high-resolution signatures of helicopters in the air and the determination of reference images using turntable measurements.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1422
Author(s):  
Ewa Dudek ◽  
Karolina Krzykowska-Piotrowska

The issue addressed in this publication concerns new Air Traffic Management (ATM) functionality, identified in the Commission Implementing Regulation (EU) No 716/2014, known as Flexible Airspace Management and Free Route (FRA). The authors pose a question—does free route implementation influence air transport safety? What can be done to maintain the current level of safety and still implement modern solutions? To achieve the aim of this paper a developed concept of Risk Priority Number (RPN) calculation, with determination of main RPN components rating scales, in order to carry out the FMEA (Failure Mode and Effects Analysis) risk analysis of FRA implementation was done. The results allow lining up of the identified potential incompatibilities according to their criticality to the system. In effect it can be said that each modification in a management system, related to safety, influence the safety itself. Nevertheless, this influence does not always lead to negative impact.


Author(s):  
Kassem Saleh ◽  
Ghanem Elshahry

To increase users’ trust in the systems they use, there is a need to develop trustworthy systems. These systems must meet the needs of the system’s stakeholders with respect to security, privacy, reliability, and business integrity (Mundy, deVries, Haynes, & Corwine, 2002). The first major step in achieving trustworthiness is to properly and faithfully capture the stakeholders requirements. A requirement is something that the system must satisfy or a quality that the system must possess. A requirement is normally elicited from the system stakeholders, including its users, developers, and owners. Requirements should be specified before attempting to construct the system. If the correct requirements are not captured properly and faithfully, the correct system cannot be built. Consequently, the system will not be usable by its intended users. The success of any system depends on meeting requirements classified under two complementary types. First, the functional requirements are the system’s operations from the user’s perspective describing the visible and external interactions with the system under consideration. Second, the non-functional requirements (NFRs) are mainly the system’s constraints imposing special conditions and qualities on the system to construct. Consequently, system acceptance testing must be based on both functional and non-functional system’s requirements. Unfortunately, it is reported that about 60% of errors originate from the requirements and analysis activities (Weinberg, 1997). Surveys have shown that large numbers of IT-based systems were implemented starting from their elicited functional requirements without a clear and formal consideration of their non-functional counterparts such as security requirements. Furthermore, system requirements engineers and analysts are not well-trained in capturing security requirements early in the system development process. Security assurances are often based on the traditional and ad hoc approach of conducting penetration tests followed by a patching process. This approach is very costly and endangers the fulfillment of the basic goals of system security, namely confidentiality, integrity, availability, and accountability. Recently, many researchers addressed security requirements engineering as an integral and essential element of systems engineering. Devanbu and Stubblebine (2000) propose a roadmap for software engineering for security, and Henning and Garner (1999) consider life cycle models for survivable and secure systems. Non-functional requirements can be classified under three broad categories (Robertson & Robertson, 1999): system-related, process and project-related and humanrelated requirements. The rest of this article is organized as follows. The next section overviews the security goals and requirements. The third section introduces security requirements modeling using the Goal-Oriented Requirements Language (GRL) (ITU, 2002) and UMLsec, a security extension to the Unified Modeling Language (Jurjens, 2005; Elshahry, 2005), and its modifications. The fourth section provides some examples of using GRL and UMLsec models for requirements specifications. We conclude in the final section and provide items for further investigation.


2022 ◽  
Author(s):  
Mbucksek Blaise Ringnwi ◽  
DAÏKA Augustin ◽  
TSEDEPNOU Rodrigue ◽  
Bon Firmin André ◽  
Kossoumna Libaa Natali

Abstract This works reports the quantification and forecasting of Cumulonimbus (Cb) clouds direction, nebulosity and occurrence with auto regression using 2018-2020 dataset from Yaoundé –Nsimalen of Cameroon. Data collected for October 2018-2020 consisted of 2232 hourly observations. Codes were written to automatically align, multi-find and replace data points in excel to facilitate treating big datasets. The approach included quantification of direction generating time series from data and determination of model orders using the correlogram. The coefficients of the SARIMA model were determined using Yule-Walker equations in matrix form, the Augmented Dickey Fuller test (ADF) was used to check for stationarity assumption, Portmanteau test to check for white noise in residuals and Shapiro-Wilk test to check normality assumptions. After writing several algorithms to test different models, an Autoregressive Neural Network (ANN) was fitted and used to predict the parameters over window of 2 weeks. Autocorrelation Function (ACF) shows no correlation between residuals, with p ≤ 0.05, fitting the stationarity assumption. Average performance is 80%. A stationary wavelike occurrence of the direction has been observed, with East as the most frequented sector. Forecast of Cb parameters is important in effective air traffic management, creating situational awareness and could serve as reference for future research. The method of decomposition could be made applicable in future research to quantify/forecast cloud directions.


2015 ◽  
Vol 5 (1) ◽  
pp. 3-17 ◽  
Author(s):  
Michaela Schwarz ◽  
K. Wolfgang Kallus

Since 2010, air navigation service providers have been mandated to implement a positive and proactive safety culture based on shared beliefs, assumptions, and values regarding safety. This mandate raised the need to develop and validate a concept and tools to assess the level of safety culture in organizations. An initial set of 40 safety culture questions based on eight themes underwent psychometric validation. Principal component analysis was applied to data from 282 air traffic management staff, producing a five-factor model of informed culture, reporting and learning culture, just culture, and flexible culture, as well as management’s safety attitudes. This five-factor solution was validated across two different occupational groups and assessment dates (construct validity). Criterion validity was partly achieved by predicting safety-relevant behavior on the job through three out of five safety culture scores. Results indicated a nonlinear relationship with safety culture scales. Overall the proposed concept proved reliable and valid with respect to safety culture development, providing a robust foundation for managers, safety experts, and operational and safety researchers to measure and further improve the level of safety culture within the air traffic management context.


Sign in / Sign up

Export Citation Format

Share Document