Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoidable presence of vulnerabilities, design faults and administrative errors, an ICT system will never be totally secure. Connecting a system to a network will necessarily introduce a risk of inappropriate access resulting in disclosure, corruption and/or loss of information. Therefore, the security of a system should ideally be interpreted in a probabilistic manner. More specifically, there is an urgent need for modelling methods that provide operational measures of the security. Dependability, on the other hand, is the ability of a computer system to deliver service that can justifiably be trusted. In a dependability context one distinguishes...
International audienceThe objective of this work is the evaluation of information systems security u...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
It is clear from the previous chapters of this book that both fault-injection techniques and analyti...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
As two different research topics with much overlap, dependability and security of computer/communica...
We present a new approach to integrated security and dependability evaluation, which is based on sto...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
There is a need to quantify system properties methodically. Dependability and security models have e...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
Historically security has developed as a discipline, separate from the original dependability framew...
The increasing importance of safety-critical fault-tolerant systems causes the need of quantitativel...
This paper describes the relations between security and dependability, and shows that existing depen...
This paper aims to analyze transient security and dependability of a vulnerable critical system, und...
International audienceThe objective of this work is the evaluation of information systems security u...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
It is clear from the previous chapters of this book that both fault-injection techniques and analyti...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
As two different research topics with much overlap, dependability and security of computer/communica...
We present a new approach to integrated security and dependability evaluation, which is based on sto...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
There is a need to quantify system properties methodically. Dependability and security models have e...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
Historically security has developed as a discipline, separate from the original dependability framew...
The increasing importance of safety-critical fault-tolerant systems causes the need of quantitativel...
This paper describes the relations between security and dependability, and shows that existing depen...
This paper aims to analyze transient security and dependability of a vulnerable critical system, und...
International audienceThe objective of this work is the evaluation of information systems security u...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
It is clear from the previous chapters of this book that both fault-injection techniques and analyti...