Conference paper Open Access
Hawkins, Richard; Kelly, Tim; Habli, Ibrahim
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd"> <identifier identifierType="DOI">10.5281/zenodo.47984</identifier> <creators> <creator> <creatorName>Hawkins, Richard</creatorName> <givenName>Richard</givenName> <familyName>Hawkins</familyName> <affiliation>Department of Computer Science, The University of York</affiliation> </creator> <creator> <creatorName>Kelly, Tim</creatorName> <givenName>Tim</givenName> <familyName>Kelly</familyName> <affiliation>Department of Computer Science, The University of York</affiliation> </creator> <creator> <creatorName>Habli, Ibrahim</creatorName> <givenName>Ibrahim</givenName> <familyName>Habli</familyName> <affiliation>Department of Computer Science, The University of York</affiliation> </creator> </creators> <titles> <title>Developing Assurance Cases for D-MILS Systems</title> </titles> <publisher>Zenodo</publisher> <publicationYear>2015</publicationYear> <subjects> <subject>D-MILS</subject> </subjects> <dates> <date dateType="Issued">2015-01-20</date> </dates> <resourceType resourceTypeGeneral="Text">Conference paper</resourceType> <alternateIdentifiers> <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/47984</alternateIdentifier> </alternateIdentifiers> <relatedIdentifiers> <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/mils</relatedIdentifier> </relatedIdentifiers> <rightsList> <rights rightsURI="http://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights> <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights> </rightsList> <descriptions> <description descriptionType="Abstract"><p>When using a D-MILS approach for high-assurance systems it is often necessary to develop an assurance case, containing an argument supported by evidence, that demonstrates that the system has the required assurance properties (such as security or safety). In this paper, we describe our approach for developing a<br> D-MILS assurance case, which is based upon a set of modular assurance case patterns that are automatically instantiated using a model-based instantiation process. We illustrate the application of our approach using a small cryptographic controller example and explain the benefits brought by our approach in support of DMILS.</p></description> </descriptions> </resource>
All versions | This version | |
---|---|---|
Views | 11 | 11 |
Downloads | 7 | 7 |
Data volume | 9.5 MB | 9.5 MB |
Unique views | 10 | 10 |
Unique downloads | 6 | 6 |