• Aucun résultat trouvé

Haut PDF Towards Safety and Security Co-engineering

Towards Safety and Security Co-engineering

Towards Safety and Security Co-engineering

... Introduction Safety and security are topics often referred in the literature as major concerns to be addressed in systems ...of safety and security in their usual standalone ...

15

Towards Safety and Security Co-engineering: Challenging Aspects for a Consistent Intertwining

Towards Safety and Security Co-engineering: Challenging Aspects for a Consistent Intertwining

... Introduction Safety and security are topics often referred in the literature as major concerns to be addressed in systems ...of safety and security in their usual standalone ...

15

VESSEDIA: Verification Engineering of Safety and Security Critical Industrial Applications Context of the project

VESSEDIA: Verification Engineering of Safety and Security Critical Industrial Applications Context of the project

... Verification Engineering of Safety and Security Critical Industrial Applications Context of the project As shown by the growing number of vulnerabilities discovered in the code of many ...

5

SAFETY? SECURITY/ TWO CULTURES?  REARTICULATING SAFETY AND SECURITY CULTURES IN CRITICAL INFRASTRUCTURES THROUGH THE LENS OF CO-PRODUCTION.

SAFETY? SECURITY/ TWO CULTURES? REARTICULATING SAFETY AND SECURITY CULTURES IN CRITICAL INFRASTRUCTURES THROUGH THE LENS OF CO-PRODUCTION.

... In order to prevent and mitigate the risks confronting them, these infrastructures have over time developed measures to increase first and foremost their [r] ...

1

Rearticulating Return of experience:  Towards a participatory and flexible REX Information Infrastructure for safety and security management

Rearticulating Return of experience: Towards a participatory and flexible REX Information Infrastructure for safety and security management

... risks and the challenges and threats they ...processes” and on the other hand, at drawing teachings from previous crises and getting prepared for future ...institutionalized and ...

1

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

... of security requirements engineering approaches in order to evaluate the extent to which they can support the evolution of secure software during the change management ...propagation and change ...

8

Moving towards software-defined security in the era of NFV and SDN

Moving towards software-defined security in the era of NFV and SDN

... ] and REV [ 247 ] are other two active verification mechanisms, in which each switch along the forwarding path computes a Message Authentication Code (MAC) and attaches as a tag to each ...controller ...

165

Development of performance-based codes, performance criteria and fire safety engineering methods

Development of performance-based codes, performance criteria and fire safety engineering methods

... deterministic and probabilistic criteria is presented and the details of these criteria can be found in Hadjisophocleous and ...lower and upper limits of various criteria, are currently used ...

34

Retooling : agricultural health and food safety for improved food and nutrition security, investment and trade

Retooling : agricultural health and food safety for improved food and nutrition security, investment and trade

... national and regional ...trade and economic development in the Caribbean are crucial and necessary aspects of managing and coordinating national and regional SPS ...

6

Bringing symmetry between and within safety and security cultures in high-risk organizations

Bringing symmetry between and within safety and security cultures in high-risk organizations

... of safety and security cultures, co-production and ANT ap- proaches present some limitations and jointly applying them poses some challenges that deserve to be ...above, ...

9

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes

... purposes and therefore, lack essential features considered in this paper, such as real-time monitoring or alert instantiation, towards achieving this ...it and determining its ...a safety or a ...

11

Embracing tensions : Dealing with safety and security in High-risk organizations

Embracing tensions : Dealing with safety and security in High-risk organizations

... risks and threats, from natural hazard risks (due to global warming for example) to intentional and malevolent threats (such as terrorist attacks, cyber-crime, insider ...prevention and protection at ...

1

Safety, Reliability and Security of Industrial Computer Systems

Safety, Reliability and Security of Industrial Computer Systems

... research and experience have also shown that safety is a property of the whole system rather than of its ...software and human co-operating in a system have to be considered together when ...

4

Towards Security Software Engineering the Smart Grid as a System of Systems

Towards Security Software Engineering the Smart Grid as a System of Systems

... [1], and social concerns have received more and more attention in recent ...pers and traffic analyzers ...avoided, and computations to perform on such anonymised ...

7

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

... feasible) and evaluation ...from security requirements experts, risk analysis and security ...definitions and collecting various perspectives from the stakeholders to find any missing ...

7

Towards a new vision of Information System Engineering

Towards a new vision of Information System Engineering

... system and management information system The second is that a design method of a digital information system is a regular process in which design can be broken down into a series of coherent steps, the completion ...

8

Co-engineering participatory modelling processes for water planning and management

Co-engineering participatory modelling processes for water planning and management

... deposit and dissemination of sci- entific research documents, whether they are pub- lished or ...teaching and research institutions in France or abroad, or from public or private research ...

780

Towards Augmented Learning in Science and Engineering in Higher Education

Towards Augmented Learning in Science and Engineering in Higher Education

... [9] and Traité de la réalité virtuelle ...process and are recognized publications in their respective ...textual and the visual contents of these works using artificial neural networks and ...

3

Towards an unified experimentation framework for protocol engineering

Towards an unified experimentation framework for protocol engineering

... Figure 2. UEF components an arbitrary complexity to be implemented, the EChannel behavior results from the composition of Experimentation Nodes (ENodes). An example of EChannel that models a satellite link is provided in ...

5

Model-Driven Engineering for Trusted Embedded Systems based on Security and Dependability Patterns

Model-Driven Engineering for Trusted Embedded Systems based on Security and Dependability Patterns

... Define needs in terms of properties and/or keywords, Search for patterns in the repository, Select the appropriate pattern from those proposed by the repository, Import the selection int[r] ...

20

Show all 10000 documents...