The Internet today provides the environment for novel applications and processes which may evolve way beyond pre-planned scope and purpose. Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes. Technical processes within critical infrastructures also have to cope with these developments. To tackle the complexity of the security analysis, the application of models is becoming standard practice. However, model-based support for security analysis is not only needed in pre-operational phases but also during process execution, in order to provide situational security awareness at runtime. This cumulative thesis provides three major contributi...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
The Internet today provides the environment for novel applications and processes which may evolve wa...
The Internet today provides the environment for novel applications and processes which may evolve w...
International audienceThe Internet today provides the environment for novel applications and process...
International audienceThe Internet today provides the environment for novel applications and process...
Enforcing security in process-aware information systems at runtime requires the monitoring of system...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
The increased usage of cyber-physical systems in a number of domains poses a unique challenge: how c...
Modern networked systems are complex in such a way that assessing the security of them is a difficul...
Runtime monitoring is performed during system execution to detect whether the system’s behaviour dev...
The assessment and management of security depends upon the availability of relevant information. Unf...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
The Internet today provides the environment for novel applications and processes which may evolve wa...
The Internet today provides the environment for novel applications and processes which may evolve w...
International audienceThe Internet today provides the environment for novel applications and process...
International audienceThe Internet today provides the environment for novel applications and process...
Enforcing security in process-aware information systems at runtime requires the monitoring of system...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
The increased usage of cyber-physical systems in a number of domains poses a unique challenge: how c...
Modern networked systems are complex in such a way that assessing the security of them is a difficul...
Runtime monitoring is performed during system execution to detect whether the system’s behaviour dev...
The assessment and management of security depends upon the availability of relevant information. Unf...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...