Duncan Ki-Aries
From requirements to operation: components for risk assessment in a pervasive system of systems.
Ki-Aries, Duncan; Dogan, Huesyin; Faily, Shamal; Whittington, Paul; Williams, Christopher
Authors
Huesyin Dogan
Shamal Faily
Paul Whittington
Christopher Williams
Abstract
Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component systems, and their differing degrees of control and emergence. This paper presents three components for SoS risk assessment that integrate with existing risk assessment approaches: Human System Integration (HSI), Interoperability identification and analysis, and Emergent behaviour evaluation and control measures. We demonstrate the application of these components by assessing a pervasive SoS: a SmartPowerchair.
Citation
KI-ARIES, D., DOGAN, H., FAILY, S., WHITTINGTON, P. and WILLIAMS, C. 2017. From requirements to operation: components for risk assessment in a pervasive system of systems. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 83-89. Available from: https://doi.org/10.1109/REW.2017.36
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017) |
Start Date | Sep 4, 2017 |
End Date | Sep 8, 2017 |
Acceptance Date | Jul 7, 2017 |
Online Publication Date | Oct 2, 2017 |
Publication Date | Dec 31, 2017 |
Deposit Date | Dec 7, 2021 |
Publicly Available Date | Dec 7, 2021 |
Publisher | IEEE Computer Society |
Peer Reviewed | Peer Reviewed |
Pages | 83-89 |
ISBN | 9781538634899 |
DOI | https://doi.org/10.1109/rew.2017.36 |
Keywords | Security risk analysis; Systems security; Internet of Things (IoT); System of systems (SoS); Human-computer interaction; User-centred design; Assistive technologies; Requirements engineering; Software engineering |
Public URL | https://rgu-repository.worktribe.com/output/1437906 |
Files
KI-ARIES 2017 From requirements to operation
(3.5 Mb)
PDF
Copyright Statement
© IEEE
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article