Affiliation:
1. Technical University of Denmark, Denmark
Abstract
Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions.
Reference60 articles.
1. Reasoning about cryptographic protocols in the spi calculus, In CONCUR’97: Concurrency Theory;M.Abadi;Springer LNCS,1997
2. Reconciling two views of cryptography: The computational soundness of formal encryption.;M.Abadi;Journal of Cryptology,2002
3. Adelsbach, A., Creese, S., Harrison, R., Ptzmann, B., Sadeghi, A. R., & Simmonds, W. …Waidner, M. (2003). Final report on verification and assessment. (IST Research Project IST-1999-11583, MAFTIA, deliverable D22), Retrieved October 20, 2010, from http://spiderman-2.laas.fr/ TSF/ cabernet/ maftia/ deliverables/ D22.pdf
4. A Mechanism for Identity Delegation at Authentication Level
5. Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. Institute for System Research, Technical Research Report, TR 2004-47. Retrieved Oct 1, 2010, from http://drum.lib.umd.edu/ handle/ 1903/ 6459