Security and functional safety - Differing requirements and related goals

被引:0
作者
Wieczorek, Felix [1 ]
Schiller, Frank [1 ]
Fiat, Roland [2 ]
Stoertkuhl, Thomas [2 ]
机构
[1] Beckhoff Automat, Nurnberg, Germany
[2] TUV SUD, Embedded Syst, Munich, Germany
来源
ATP EDITION | 2013年 / 06期
关键词
functional safety; security; automation; safety-integrity level; security level;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Measures of functional safety and security often have similar goals, so that solutions for both domains can overlap. For instance, security measures are necessary for safety functions if they are vulnerable via public networks. However, requirements differ considerably between intelligent attacks on security on the one hand and random or systematic faults and human errors of functional safety on the other hand. In this article, besides a description of both functional safety and security for automation, we describe the relationships between their goals such that structured and efficient solutions will be possible. For their evaluation, we propose common metrics for both domains.
引用
收藏
页码:40 / 46
页数:7
相关论文
共 50 条
[41]   Review of progress with EMC-related functional safety [J].
Armstrong, K .
2003 IEEE SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, SYMPOSIUM RECORD, VOLS 1 AND 2, 2003, :454-459
[42]   Requirements Analysis for the Evaluation of Automated Security Risk Assessments [J].
Ehrlich, Marco ;
Lukas, Georg ;
Trsek, Henning ;
Jasperneite, Juegen ;
Kastner, Wolfgang ;
Diedrich, Christian .
2024 IEEE 20TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS, 2024, :180-183
[43]   Managers' and Employees' Differing Responses to Security Approaches [J].
Balozian, Puzant ;
Leidner, Dorothy ;
Warkentin, Merrill .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) :197-210
[44]   Towards Safety and Security-Related Testing of Crisis Management Solutions [J].
Tagarev, Todor ;
Ivanova, Petya ;
Dubost, Laurent ;
Dangerville, Cyril .
INFORMATION TECHNOLOGY IN DISASTER RISK REDUCTION, ITDRR 2020, 2021, 622 :216-234
[45]   Balancing Security Requirements and Emotional Requirements in Video Games [J].
Callele, David ;
Neufeld, Eric ;
Schneider, Kevin .
PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2008, :319-320
[46]   A Study of Security Requirements Negotiation [J].
Ye, Xinfeng .
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, :51-56
[47]   Security Requirements for Smart Toys [J].
de Carvalho, Luciano Goncalves ;
Eler, Marcelo Medeiros .
ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2017, :144-154
[48]   SECURITY REQUIREMENTS FOR NETWORK MANAGEMENT [J].
SHIREY, RW .
COMPUTER STANDARDS & INTERFACES, 1995, 17 (04) :321-331
[49]   Using Security and Domain ontologies for Security Requirements Analysis [J].
Souag, Amina ;
Salinesi, Camille ;
Wattiau, Isabelle ;
Mouratidis, Haris .
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, :101-107
[50]   SECURITY IN VALUE ADDED NETWORKS - SECURITY REQUIREMENTS FOR EDI [J].
JERMANBLAZIC, B .
COMPUTER STANDARDS & INTERFACES, 1991, 12 (01) :23-33