Safe & Sec Case Patterns | SpringerLink
Skip to main content

Safe & Sec Case Patterns

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9338))

Included in the following conference series:

Abstract

Many industrial sectors, which manufacture safety intensive systems e.g., automotive, railway, etc., now face technical challenges on how to integrate and harmonize critical issues on safety in addition to security for their systems. In this paper, we will explore a new way of reconciling those issues in an argument form, which we call Safe & Sec (Safety and Security) case patterns. They are derived from process patterns identified from our literature survey on research and standards. Safe & Sec case patterns in this paper will provide practitioners a wide perspective and baseline on how they could provide an assurance framework for their safety intensive systems with security focus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alexander, R., Hawkins, R., Kelly, T.: Security assurance cases: Motivation and the state of the art. Department of Computer Science, University of York, Technical report (2011)

    Google Scholar 

  2. Bieber, P., Blanquart, J.P., Descargues, G., Dulucq, M., Fourastier, Y., Hazane, E., Julien, M., Léonardon, L., Sarouille, G.: Security and safety assurance for aerospace embedded systems. In: Proceedings of the 6th International Conference on Embedded Real Time Software and Systems, ERTS 2012, pp. 1–10 (2012)

    Google Scholar 

  3. Bloomfield, R., Netkachova, K., Stroud, R.: Security-informed safety: if it’s not secure, it’s not safe. In: Gorbenko, A., Romanovsky, A., Kharchenko, V. (eds.) SERENE 2013. LNCS, vol. 8166, pp. 17–32. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Boran, L.: Automotive cyber-security. In: Escar Europe (2013)

    Google Scholar 

  5. Born, M.: An approach to safety and security analysis for automotive systems. In: SAE 2014 World Congress and Exhibition (2014)

    Google Scholar 

  6. Goodenough, J., Lipson, H.F., Weinstock, C.B.: Arguing security - creating security assurance cases. Technical report SEI/CMU (2014)

    Google Scholar 

  7. IEC 62280:2014: Railway applications - Communication, signaling and processing systems -Safety related communication in transmission systems (2014)

    Google Scholar 

  8. IEC61025: Fault tree analysis (FTA) (2006)

    Google Scholar 

  9. ISO26262:2011: Road Vehicle - Functional Safety -, Part 1 to Part 9 (2011)

    Google Scholar 

  10. ISO/IEC 15408: Common Criteria for Information Technology Security Evaluation (2012)

    Google Scholar 

  11. Kelly, T.: Arguing Safety - A Systematic Approach to Safety Case Management. Ph.D. thesis, Department of Computer Science, University of York (1998)

    Google Scholar 

  12. Kordy, B., Piètre-Cambacédès, L., Schweitzer, P.: Dag-based attack and defense modeling: Don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014). http://dx.doi.org/10.1016/j.cosrev.2014.07.001

  13. Praxis: SafSec: Integration of Safety & Security Certification, SafSec Methodology: Guidance Material (2006)

    Google Scholar 

  14. Praxis: SafSec: Integration of Safety & Security Certification, SafSec Methodology: Standard (2006)

    Google Scholar 

  15. RTCA DO-326A: Airworthiness Security Process Specification (2014)

    Google Scholar 

  16. SAE: Cybersecurity Guidebook for Cyber-Physical Automotive Systems

    Google Scholar 

  17. Schneier, B.: Attack Trees. Dr. Dobbs Journal (1996)

    Google Scholar 

  18. SESAMO. http://sesamo-project.eu/

  19. Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-Physical Systems) (2013)

    Google Scholar 

  20. UK Ministory of Defence: Defence standard 00–56: Safety management requirements for defence systems (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Kenji Taguchi , Daisuke Souma or Hideaki Nishihara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Taguchi, K., Souma, D., Nishihara, H. (2015). Safe & Sec Case Patterns. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9338. Springer, Cham. https://doi.org/10.1007/978-3-319-24249-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24249-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24248-4

  • Online ISBN: 978-3-319-24249-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics