Nie znaleźliśmy wyników w zadanych kryteriach!
Ale mamy wyniki w innych katalogach.Filtry
wszystkich: 319
-
Katalog
- Publikacje 284 wyników po odfiltrowaniu
- Czasopisma 23 wyników po odfiltrowaniu
- Konferencje 1 wyników po odfiltrowaniu
- Osoby 5 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 2 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 2 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: SECURITY, EVIDENCE BASED ARGUMENTS
-
Using evidence based arguments to support trust
PublikacjaWprowadzono podstawowe koncepcje metodyki TRUST-IT: argumentu i dowodu, modelu argumentacji, szablonu argumentacji, oceny argumentu oraz kontekstu aplikacyjnego. Przedstawiono zakres funkcjonalności, modele udostepniania oraz politykę bezpieczeństwa informacji związane z usługami NOR-STA wspomagającymi zastosowania metodyki TRUST-IT. Przedstawiono również dotychczasowe doświadczenia związane z wdrażaniam uzług NOR-STA w różnych...
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Using Evidence-based Arguments to Support Dependability Assurance-Experiences and Challenges
PublikacjaThe article introduces to the problem of evidence-based arguments and their applications. Then, based on the experiences collected during commercial deployment of a concrete solution to this problem (system NOR-STA) we overview selected challenges and the ways of addressing them
-
Using Evidence-based Arguments to Support Dependability Assurance - Experiences and Challenges
PublikacjaThe presentation introduces to the problem of evidence-based arguments and their applications. Then, based on the experiences collected during development and commercial deployment of a concrete solution to this problem (system NOR-STA) we overview selected challenges and the ways of addressing them.
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Support for argument structures review and assessment
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
Supporting Assurance by Evidence-based Argument Services
PublikacjaStructured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...
-
International Workshop on Realising Evidence-based Software Engineering
Konferencje -
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...