When using a D-MILS approach for high-assurance systems it is often necessary to develop an assurance case, containing an argument supported by evidence, that demonstrates that the system has the required assurance properties (such as security or safety). In this paper, we describe our approach for developing a D-MILS assurance case, which is based upon a set of modular assurance case patterns that are automatically instantiated using a model-based instantiation process. We illustrate the application of our approach using a small cryptographic controller example and explain the benefits brought by our approach in support of DMILS
A "security by design" method achieves robustness against programming errors and malicious attacks. ...
Assurance cases are a standard modeling technique to show that a claim regarding a system\u27s safet...
Showing that dependable embedded systems fulfil vital quality attributes, e.g. by conforming to rele...
International audienceAssuring that security requirements have been met in design phases is less exp...
International audienceSafety-critical systems are used in many domains (military, avionics, aerospac...
Security and cryptography protocols are seen by many as black-magic, largely due to their complex ma...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
Part 2: Security EngineeringInternational audienceModern information and distributed systems runs fo...
Assurance cases are used to argue in a structured, and evidence-supported way, that a property such ...
In this work, we tackle the problem of certifying Adaptive systems. These are able to automatically ...
System assurance cases are used to demonstrate confidence in system properties of interest (e.g. saf...
In this paper we describe how the automated instantiation of assurance case arguments will require i...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
This paper discusses the application of assurance cases as a means of building confidence that the s...
AbstractIn this paper we present a new reasonable method for writing security cases. A security case...
A "security by design" method achieves robustness against programming errors and malicious attacks. ...
Assurance cases are a standard modeling technique to show that a claim regarding a system\u27s safet...
Showing that dependable embedded systems fulfil vital quality attributes, e.g. by conforming to rele...
International audienceAssuring that security requirements have been met in design phases is less exp...
International audienceSafety-critical systems are used in many domains (military, avionics, aerospac...
Security and cryptography protocols are seen by many as black-magic, largely due to their complex ma...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
Part 2: Security EngineeringInternational audienceModern information and distributed systems runs fo...
Assurance cases are used to argue in a structured, and evidence-supported way, that a property such ...
In this work, we tackle the problem of certifying Adaptive systems. These are able to automatically ...
System assurance cases are used to demonstrate confidence in system properties of interest (e.g. saf...
In this paper we describe how the automated instantiation of assurance case arguments will require i...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
This paper discusses the application of assurance cases as a means of building confidence that the s...
AbstractIn this paper we present a new reasonable method for writing security cases. A security case...
A "security by design" method achieves robustness against programming errors and malicious attacks. ...
Assurance cases are a standard modeling technique to show that a claim regarding a system\u27s safet...
Showing that dependable embedded systems fulfil vital quality attributes, e.g. by conforming to rele...