Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM
The design and construction industry is moving towards Building Information Models (BIM) that provide all of the strengths of traditional 3D CAD with an added layer of data allowing new and powerful applications. We investigate the concept of using the data within BIM to better explore security desi...
| Main Authors: | , , , |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier BV
2014
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/11469 |
| _version_ | 1848747814282067968 |
|---|---|
| author | Porter, Stuart Tan, Terence Peng Lian Tan, Tele West, Geoff |
| author_facet | Porter, Stuart Tan, Terence Peng Lian Tan, Tele West, Geoff |
| author_sort | Porter, Stuart |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | The design and construction industry is moving towards Building Information Models (BIM) that provide all of the strengths of traditional 3D CAD with an added layer of data allowing new and powerful applications. We investigate the concept of using the data within BIM to better explore security design and considerations. We achieve this by first graphing the physical entities of BIM to capture their relational representation as nodes and links. This graph representation will facilitate the use of graph theory or agent-based simulation to assist in the analysis of the static and dynamic behaviour of the environment around the BIM. We also demonstrate an application of graphing by investigating the use of BIM to explore automated infrastructure security design and consideration via red-teaming. The intent is to make security analysis easier and a process that can be carried out during the design phase of a project, even by non-expert users. |
| first_indexed | 2025-11-14T06:55:07Z |
| format | Journal Article |
| id | curtin-20.500.11937-11469 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T06:55:07Z |
| publishDate | 2014 |
| publisher | Elsevier BV |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-114692019-02-19T04:26:59Z Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM Porter, Stuart Tan, Terence Peng Lian Tan, Tele West, Geoff Security Intelligent agents Delay Graph BIM Simulation Multi-agent Red team The design and construction industry is moving towards Building Information Models (BIM) that provide all of the strengths of traditional 3D CAD with an added layer of data allowing new and powerful applications. We investigate the concept of using the data within BIM to better explore security design and considerations. We achieve this by first graphing the physical entities of BIM to capture their relational representation as nodes and links. This graph representation will facilitate the use of graph theory or agent-based simulation to assist in the analysis of the static and dynamic behaviour of the environment around the BIM. We also demonstrate an application of graphing by investigating the use of BIM to explore automated infrastructure security design and consideration via red-teaming. The intent is to make security analysis easier and a process that can be carried out during the design phase of a project, even by non-expert users. 2014 Journal Article http://hdl.handle.net/20.500.11937/11469 10.1016/j.autcon.2013.12.002 Elsevier BV fulltext |
| spellingShingle | Security Intelligent agents Delay Graph BIM Simulation Multi-agent Red team Porter, Stuart Tan, Terence Peng Lian Tan, Tele West, Geoff Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM |
| title | Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM |
| title_full | Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM |
| title_fullStr | Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM |
| title_full_unstemmed | Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM |
| title_short | Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM |
| title_sort | breaking into bim: performing static and dynamic security analysis with the aid of bim |
| topic | Security Intelligent agents Delay Graph BIM Simulation Multi-agent Red team |
| url | http://hdl.handle.net/20.500.11937/11469 |