Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Information security embedded in the design of telematics systems

Identifieur interne : 005260 ( Main/Merge ); précédent : 005259; suivant : 005261

Information security embedded in the design of telematics systems

Auteurs : O. Tettero [Pays-Bas] ; D. J. Out [Pays-Bas] ; H. M. Franken [Pays-Bas] ; J. Schot [Pays-Bas]

Source :

RBID : ISTEX:DE20A0795ABEFE451DB4E8DE4546C082318CFCBB

Abstract

As organizations become increasingly dependent on their telematics systems, they become more vulnerable to interruptions and breakdowns of these systems. Most organizations only realize this dependency, and the exact nature of their vulnerability, once the telematics systems are in place. This often results in the ad hoc addition of safeguards, which causes operational problems. The most important cause of this phenomenon is the fact that information security requirements were never an issue during the design of most systems. In this paper we propose that requirements for information security should be integrated in the design process in an early phase. The benefit of this is that information security will become an integral part of the system. We present an approach that addresses the issue of security requirements in all stages of the design process. For each stage we discuss how these information security requirements can be embedded in that stage.

Url:
DOI: 10.1016/S0167-4048(97)00003-5

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:DE20A0795ABEFE451DB4E8DE4546C082318CFCBB

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title>Information security embedded in the design of telematics systems</title>
<author>
<name sortKey="Tettero, O" sort="Tettero, O" uniqKey="Tettero O" first="O." last="Tettero">O. Tettero</name>
</author>
<author>
<name sortKey="Out, D J" sort="Out, D J" uniqKey="Out D" first="D. J." last="Out">D. J. Out</name>
</author>
<author>
<name sortKey="Franken, H M" sort="Franken, H M" uniqKey="Franken H" first="H. M." last="Franken">H. M. Franken</name>
</author>
<author>
<name sortKey="Schot, J" sort="Schot, J" uniqKey="Schot J" first="J." last="Schot">J. Schot</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:DE20A0795ABEFE451DB4E8DE4546C082318CFCBB</idno>
<date when="1997" year="1997">1997</date>
<idno type="doi">10.1016/S0167-4048(97)00003-5</idno>
<idno type="url">https://api.istex.fr/document/DE20A0795ABEFE451DB4E8DE4546C082318CFCBB/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002D36</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002D36</idno>
<idno type="wicri:Area/Istex/Curation">002D36</idno>
<idno type="wicri:Area/Istex/Checkpoint">003A30</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">003A30</idno>
<idno type="wicri:doubleKey">0167-4048:1997:Tettero O:information:security:embedded</idno>
<idno type="wicri:Area/Main/Merge">005260</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a">Information security embedded in the design of telematics systems</title>
<author>
<name sortKey="Tettero, O" sort="Tettero, O" uniqKey="Tettero O" first="O." last="Tettero">O. Tettero</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Pays-Bas</country>
<wicri:regionArea>Telematics Research Centre, P.O. Box 589, 7500 AN Enschede</wicri:regionArea>
<wicri:noRegion>7500 AN Enschede</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Pays-Bas</country>
</affiliation>
</author>
<author>
<name sortKey="Out, D J" sort="Out, D J" uniqKey="Out D" first="D. J." last="Out">D. J. Out</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Pays-Bas</country>
<wicri:regionArea>Telematics Research Centre, P.O. Box 589, 7500 AN Enschede</wicri:regionArea>
<wicri:noRegion>7500 AN Enschede</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Pays-Bas</country>
</affiliation>
</author>
<author>
<name sortKey="Franken, H M" sort="Franken, H M" uniqKey="Franken H" first="H. M." last="Franken">H. M. Franken</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Pays-Bas</country>
<wicri:regionArea>Telematics Research Centre, P.O. Box 589, 7500 AN Enschede</wicri:regionArea>
<wicri:noRegion>7500 AN Enschede</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Pays-Bas</country>
</affiliation>
</author>
<author>
<name sortKey="Schot, J" sort="Schot, J" uniqKey="Schot J" first="J." last="Schot">J. Schot</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Pays-Bas</country>
<wicri:regionArea>Telematics Research Centre, P.O. Box 589, 7500 AN Enschede</wicri:regionArea>
<wicri:noRegion>7500 AN Enschede</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Pays-Bas</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Computers & Security</title>
<title level="j" type="abbrev">COSE</title>
<idno type="ISSN">0167-4048</idno>
<imprint>
<publisher>ELSEVIER</publisher>
<date type="published" when="1997">1997</date>
<biblScope unit="volume">16</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="145">145</biblScope>
<biblScope unit="page" to="164">164</biblScope>
</imprint>
<idno type="ISSN">0167-4048</idno>
</series>
<idno type="istex">DE20A0795ABEFE451DB4E8DE4546C082318CFCBB</idno>
<idno type="DOI">10.1016/S0167-4048(97)00003-5</idno>
<idno type="PII">S0167-4048(97)00003-5</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0167-4048</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">As organizations become increasingly dependent on their telematics systems, they become more vulnerable to interruptions and breakdowns of these systems. Most organizations only realize this dependency, and the exact nature of their vulnerability, once the telematics systems are in place. This often results in the ad hoc addition of safeguards, which causes operational problems. The most important cause of this phenomenon is the fact that information security requirements were never an issue during the design of most systems. In this paper we propose that requirements for information security should be integrated in the design process in an early phase. The benefit of this is that information security will become an integral part of the system. We present an approach that addresses the issue of security requirements in all stages of the design process. For each stage we discuss how these information security requirements can be embedded in that stage.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Merge
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 005260 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Merge/biblio.hfd -nk 005260 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Main
   |étape=   Merge
   |type=    RBID
   |clé=     ISTEX:DE20A0795ABEFE451DB4E8DE4546C082318CFCBB
   |texte=   Information security embedded in the design of telematics systems
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024