International audienceFor critical software applications, dependability and safety are required features that should respect security principles. To cope with these constraints, the design activity should use new methods that foster knowledge sharing and reuse, in particular security problems and their solutions. In this paper, we present a problem-oriented method that follows a step-wise building of the solution. Problems are reused using various mechanisms, and a solution is conceived, verified and diagnosed. We illustrate the approach on the problem of building a secure SCADA architecture
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
As software becomes ever more embedded into the fabric of society, more systems are becoming critica...
Both academia and industry advocate the security by design principle to stress the importance of dea...
International audienceFor critical software applications, dependability and safety are required feat...
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Informat...
Standards mandate the demonstration of safety prop-erties for industrial software, starting at the ...
International audienceV. Basili stated twenty years ago that a software organization that manages qu...
Abstract. We present several problem frames that serve to structure, character-ize and analyze softw...
Safety Critical Systems (SCS) are defined as systems controlling critical technological processes, o...
systems support and control the operation of many critical infrastructures that our society depend o...
International audienceSecuring critical systems such as cyber physical systems (CPS) is an important...
SCADA stands for supervisory control and data acquisition; it is a computer system for gathering, an...
method for designing secure solutions The task of developing information technology (IT) solutions t...
Risk-driven approaches are dominant in secure systems design; these aim to elicit and treat vulnerab...
International audienceInformation security was initially required in specific applications, however,...
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
As software becomes ever more embedded into the fabric of society, more systems are becoming critica...
Both academia and industry advocate the security by design principle to stress the importance of dea...
International audienceFor critical software applications, dependability and safety are required feat...
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Informat...
Standards mandate the demonstration of safety prop-erties for industrial software, starting at the ...
International audienceV. Basili stated twenty years ago that a software organization that manages qu...
Abstract. We present several problem frames that serve to structure, character-ize and analyze softw...
Safety Critical Systems (SCS) are defined as systems controlling critical technological processes, o...
systems support and control the operation of many critical infrastructures that our society depend o...
International audienceSecuring critical systems such as cyber physical systems (CPS) is an important...
SCADA stands for supervisory control and data acquisition; it is a computer system for gathering, an...
method for designing secure solutions The task of developing information technology (IT) solutions t...
Risk-driven approaches are dominant in secure systems design; these aim to elicit and treat vulnerab...
International audienceInformation security was initially required in specific applications, however,...
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for al...
As software becomes ever more embedded into the fabric of society, more systems are becoming critica...
Both academia and industry advocate the security by design principle to stress the importance of dea...