Security and functional safety - Differing requirements and related goals

被引:0
作者
Wieczorek, Felix [1 ]
Schiller, Frank [1 ]
Fiat, Roland [2 ]
Stoertkuhl, Thomas [2 ]
机构
[1] Beckhoff Automat, Nurnberg, Germany
[2] TUV SUD, Embedded Syst, Munich, Germany
来源
ATP EDITION | 2013年 / 06期
关键词
functional safety; security; automation; safety-integrity level; security level;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Measures of functional safety and security often have similar goals, so that solutions for both domains can overlap. For instance, security measures are necessary for safety functions if they are vulnerable via public networks. However, requirements differ considerably between intelligent attacks on security on the one hand and random or systematic faults and human errors of functional safety on the other hand. In this article, besides a description of both functional safety and security for automation, we describe the relationships between their goals such that structured and efficient solutions will be possible. For their evaluation, we propose common metrics for both domains.
引用
收藏
页码:40 / 46
页数:7
相关论文
共 50 条
[31]   A Security Ontology for Security Requirements Elicitation [J].
Souag, Amina ;
Salinesi, Camille ;
Mazo, Raul ;
Comyn-Wattiau, Isabelle .
ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 :157-175
[32]   Designing a Method for Identifying Functional Safety and Cybersecurity Requirements Utilizing Model-Based Systems Engineering [J].
Nolte, Bastian ;
Stein, Armin ;
Vietor, Thomas .
APPLIED SYSTEM INNOVATION, 2025, 8 (02)
[33]   Deriving Functional Safety Requirements using Undesired Combination State Templates [J].
Aceituna, Daniel ;
Madala, Kaushik ;
Do, Hyunsook .
2018 4TH INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING FOR SELF-ADAPTIVE, COLLABORATIVE, AND CYBER PHYSICAL SYSTEMS (RESACS 2018), 2018, :1-8
[34]   Detection of Security and Safety Threats related to the Control of a SDN Architecture [J].
Desgeorges, Loic ;
Georges, Jean-Philippe ;
Divoux, Thierry .
IFAC PAPERSONLINE, 2021, 54 (04) :153-158
[35]   Security, Safety, and Related Technology - The Triangle of eHealth Service Provision [J].
Savastano, Mario ;
Hovsto, Asbjorn ;
Pharow, Peter ;
Blobel, Bernd .
EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 :709-+
[36]   A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application [J].
Hosseini, Ali M. ;
Fischer, Clara ;
Bhole, Mukund ;
Kastner, Wolfgang ;
Sauter, Thilo ;
Schlund, Sebastian .
2023 IEEE 19TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS, 2023, :150-157
[37]   A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements [J].
Arogundade, O. T. ;
Akinwale, A. T. ;
Jin, Z. ;
Yang, X. G. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (04) :8-30
[38]   Integrated Functional Safety and Security Diagnosis Mechanism of CPS Based on Blockchain [J].
Gu A. ;
Yin Z. ;
Cui C. ;
Li Y. .
IEEE Access, 2020, 8 :15241-15255
[39]   Integrated Functional Safety and Security Diagnosis Mechanism of CPS Based on Blockchain [J].
Gu, Ai ;
Yin, Zhenyu ;
Cui, Chuanyu ;
Li, Yue .
IEEE ACCESS, 2020, 8 :15241-15255
[40]   Review of progress with EMC-related functional safety [J].
Armstrong, K .
2003 IEEE SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, SYMPOSIUM RECORD, VOLS 1 AND 2, 2003, :454-459