STAMP-based Approach to Analyze Safety, Security and Data Privacy

被引:5
作者
de Souza, Nivio Paula [1 ]
Castro Cesar, Cecilia de Azevedo [1 ]
Bezerra, Juliana de Melo [1 ]
Hirata, Celso Massaki [1 ]
机构
[1] Inst Tecnol Aeronaut, Dept Comp Sci, Sao Jose Dos Campos, Brazil
来源
2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC) | 2019年
关键词
STAMP; STPA; safety; security; privacy;
D O I
10.1109/ladc48089.2019.8995717
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security has been of paramount importance to organizations since its lack can result in financial and reputational losses. Privacy is gaining attention because of the increasing legal protection of the right to data privacy. Due to their complexity, in terms of technology, sociology and law, assuring both security and privacy is a major challenge in the development of cyber-physical systems. In general, both security and privacy concerns are addressed by security countermeasures. There is no approach that employs the systems theory model to jointly identify and analyze security and privacy issues. STAMP is a causation model, based on systems theory, that allows analyzing emergent properties in the concept stage of system development. STPA is the tool based on STAMP to analyze safety. STPA has been employed to analyze more recently security. In this work, we propose an approach based on STAMP to analyze safety, security and privacy concerns jointly for cyber-physical systems. The approach uses attributes and threats of security and privacy to identify losses and hazards. We employ the approach in an example of electronic voting system development and we show that the approach is effective in identifying hazardous control actions.
引用
收藏
页码:181 / 190
页数:10
相关论文
共 19 条
  • [1] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [2] Bambauer DE, 2013, J CRIM LAW CRIM, V103, P667
  • [3] Analyzing regulatory rules for privacy and security requirements
    Breaux, Travis D.
    Anton, Annie I.
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 5 - 20
  • [4] Deng M., 2011, REQUIR ENG, V16, P332
  • [5] Kotz D., 2009, Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems, P1, DOI DOI 10.1145/1655084.1655086
  • [6] Leveson N. G., 2018, STPA Handbook
  • [7] Leveson NG, 2011, ENG SYST, P1
  • [8] Maaten E., 2004, ELECT VOTING EUROPE, V47, P83100
  • [9] Meingast M., 2006, P 28 ANN C IEEE ENG, P54535458
  • [10] Microsoft, 2009, The stride threat model