A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems
Large amount of (security) faults existing in software systems could be complex and hard to identify during the fault analysis. So, it is not always possible to fully mitigate the internal or external security faults (vulnerabilities or threats) within the system. On the other hand, existence of fau...
| Main Authors: | Mougouei, Davoud, Moghtadaei, Mohammad, Moradmand, Somayeh |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47743/ http://psasir.upm.edu.my/id/eprint/47743/1/A%20goal-based%20modeling%20approach%20to%20develop%20security%20requirements%20of%20fault%20tolerant%20security-critical%20systems.pdf |
Similar Items
Evaluating fault tolerance in security requirements of web services.
by: Mougouei, Davoud, et al.
Published: (2012)
by: Mougouei, Davoud, et al.
Published: (2012)
Fuzzy description of security requirements for intrusion tolerant web-services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
A fuzzy-based technique for describing security requirements of intrusion tolerant systems
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Food security requires national leadership
by: Yeong, Sheng Tey
Published: (2023)
by: Yeong, Sheng Tey
Published: (2023)
Fault Tolerance for Complex System
by: Chan, Shi Jing, et al.
Published: (2016)
by: Chan, Shi Jing, et al.
Published: (2016)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Fault tolerant cloud auditing
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
Requirements elicitation using goal-based organizational model
by: Krishna, Aneesh, et al.
Published: (2008)
by: Krishna, Aneesh, et al.
Published: (2008)
Development of customized distribution automation system (DAS) for secure fault isolation in low voltage distribution system
by: Ahmed, Musse Mohmaud Ahmed, et al.
Published: (2010)
by: Ahmed, Musse Mohmaud Ahmed, et al.
Published: (2010)
Optimal goal programming of softgoals in goal-oriented requirements engineering
by: Subramanian, C., et al.
Published: (2016)
by: Subramanian, C., et al.
Published: (2016)
Towards a secure and available smart grid using intrusion tolerance.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Use of security patterns for development of secure healthcare information system
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
An extended induction motor model for investigation of faulted machines and fault tolerant variable speed drives
by: Jasim, Omar
Published: (2010)
by: Jasim, Omar
Published: (2010)
Testing Sphinx’s language model fault-tolerance for the Holy Quran
by: El Amrani, Mohamed Yassine, et al.
Published: (2017)
by: El Amrani, Mohamed Yassine, et al.
Published: (2017)
An intrusion tolerant system architecture for secure and self-healing smart grid control centers
by: Tanha, Maryam
Published: (2013)
by: Tanha, Maryam
Published: (2013)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
A survey on potential reactive fault tolerance approach for distributed systems in big data
by: Noraziah, Ahmad, et al.
Published: (2023)
by: Noraziah, Ahmad, et al.
Published: (2023)
Design and development of RFID security model
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Voting algorithms for large scale fault-tolerant systems
by: Karimi, Abbas
Published: (2011)
by: Karimi, Abbas
Published: (2011)
Artificial olfactory system with fault-tolerant sensor array
by: Lotfivand, Nasser, et al.
Published: (2016)
by: Lotfivand, Nasser, et al.
Published: (2016)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Aggregation of swarms for fault tolerance inswarm robotics using immuno-enginering approach
by: Ismail, Amelia Ritahani, et al.
Published: (2009)
by: Ismail, Amelia Ritahani, et al.
Published: (2009)
Enhancing BVAG data replication transactions with highpriority-neighbour fault tolerance approach
by: Sharifah Hafizah, Sy Ahmad Ubaidillah, et al.
Published: (2025)
by: Sharifah Hafizah, Sy Ahmad Ubaidillah, et al.
Published: (2025)
The vesting of PPSA security interests: A critical look at the critical time
by: Widdup, Linda
Published: (2015)
by: Widdup, Linda
Published: (2015)
Embryonic Development and Nutritional Requirements of Kutum Fry, Rutilus Frisii Kutum
by: Haghighi, Davoud Talebi
Published: (2006)
by: Haghighi, Davoud Talebi
Published: (2006)
Design and modelling of permanent magnet machine's windings for fault-tolerant applications
by: Arumugam, Puvaneswaran
Published: (2013)
by: Arumugam, Puvaneswaran
Published: (2013)
SUPPLY CHAIN SECURITY IN THAILAND:
A CRITICAL REVIEW
by: Nilbanjerdkul, Wisinee
Published: (2010)
by: Nilbanjerdkul, Wisinee
Published: (2010)
Optimal assignments of versions to processors in fault-tolerant computer systems
by: Leow, Soo Kar, et al.
Published: (1988)
by: Leow, Soo Kar, et al.
Published: (1988)
Cost Estimation Model for Secure Software Development
by: Sia Abdullah, Nur Atiqah
Published: (2011)
by: Sia Abdullah, Nur Atiqah
Published: (2011)
A Critical Review of Supply Chain Security in India and
Total Quality Management in Supply Chain Security Context
by: Jain, Ashish
Published: (2010)
by: Jain, Ashish
Published: (2010)
Energy security indicators for Pakistan: an integrated approach
by: Abdullah, Fahad, et al.
Published: (2020)
by: Abdullah, Fahad, et al.
Published: (2020)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Fault detection and tolerance of electrical machines in automotive applications
by: Buckley, Gary
Published: (2017)
by: Buckley, Gary
Published: (2017)
Similar Items
-
Evaluating fault tolerance in security requirements of web services.
by: Mougouei, Davoud, et al.
Published: (2012) -
Fuzzy description of security requirements for intrusion tolerant web-services
by: Mougouei, Davoud, et al.
Published: (2013) -
A fuzzy-based technique for describing security requirements of intrusion tolerant systems
by: Mougouei, Davoud, et al.
Published: (2013) -
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013) -
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)