Abstract
The emergence of systems identified as both safety and security critical has motivated research and industry to search for novel approaches to conduct multi-concern engineering (co-engineering). But several aspects and issues have arisen during the process what has limited the advances. Among them, there are the specificities found in concepts, methods and development cycles, the current standalone practices of safety and security, and the lack of consolidated metrics for safety-security assessment. This paper presents synthetic discussions on referred topics along with some suggestions for solutions and perspectives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
SAE International : ARP4754A - Guidelines for Development of Civil Aircraft and Systems. SAE International (2010). https://www.sae.org/standards/content/arp4754a/
International Organization for Standardization: ISO 26262 - Road vehicles - Functional safety. ISO (2011). https://www.iso.org/standard/43464.html
International Organization for Standardization: ISO 27005 - Information technology - Security techniques - Information security risk management. ISO (2018). https://www.iso.org/standard/75281.html
Agence Nationale de la Sécurité des Systèmes d’Information: EBIOS - Expression des Besoins et Identification des Objectifs de Sécurité. ANSSI (2010). https://www.ssi.gouv.fr/guide/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite/
European Organization for Civil Aviation Equipment: ED202 - Airworthiness Security Process Specification. EUROCAE (2014). https://eurocae.net/
European Organization for Civil Aviation Equipment: ED203 - Airworthiness Security Methods and Considerations. EUROCAE (2018). https://eurocae.net/
International Electrotechnical Commission: IEC 61508 - Functional safety of electrical/electronic/programmable electronic safety-related systems. IEC (2010). https://webstore.iec.ch/publication/22273
Pedroza, G., Idrees, M.S., Apvrille, L., Roudier, Y.: A formal methodology applied to secure over-the-air automotive applications. In: Proceedings on Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE, San Francisco (2011)
Hamid, B., Gürgens, S., Fuchs, A.: Security patterns modeling and formalization for pattern-based development of secure software systems. J. Innov. Syst. Softw. Eng. 12(2), 109–140 (2016)
Object Management Group: Unified Modeling Language Specification. OMG (2017). https://www.omg.org/spec/UML/About-UML/
Object Management Group: System Modeling Language Specification. OMG (2017). https://www.omg.org/spec/SysML/About-SysML/
Holm, H.: A large-scale study of the time required to compromise a computer system. In: IEEE Proceedings of Transactions on Dependable and Secure Computing, vol. 11, no. 1, pp. 2–15, January–February 2014
Fovino, I.N., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9), 1394–1402 (2009). ScienceDirect, LNCS Elsevier
Institut pour la Maîtrise des Risques: Experimentation of the new reliability prediction method FIDES. IMDR (2017). https://eeepitnl.tksc.jaxa.jp/mews/en/20th/data/1_10.pdf
U.S. Senate-Committee on Commerce, Science, and Transportation: A “Kill Chain” Analysis of the 2013 Target Data Breach-March 26 2013. USA (2014). https://www.commerce.senate.gov/public/
Object Management Group (2019). https://www.omg.org
The Eclipse Foundation: Papyrus (2019). https://www.eclipse.org/papyrus/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Pedroza, G. (2019). Towards Safety and Security Co-engineering. In: Hamid, B., Gallina, B., Shabtai, A., Elovici, Y., Garcia-Alfaro, J. (eds) Security and Safety Interplay of Intelligent Software Systems. CSITS ISSA 2018 2018. Lecture Notes in Computer Science(), vol 11552. Springer, Cham. https://doi.org/10.1007/978-3-030-16874-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-16874-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16873-5
Online ISBN: 978-3-030-16874-2
eBook Packages: Computer ScienceComputer Science (R0)