2014-01-01から1ヶ月間の記事一覧

Eliciting security requirements with misuse cases

Another possibility is to align misuse cases with traditional fault-tree analysis methods from the safety area, such as threat trees [49] or attack trees [50, 51]. Adapted for security analysis, these trees would decompose security threats…

Coherency of fault trees; Coherent and non-coherent fault trees

Fault trees are classified according to their logic function. If during fault tree construction only AND gates and OR gates are used, the resulting fault tree is defined as coherent. If NOT logic is used or directly implied, the resulting …

Minimal Cut Sets

Minimal Cut Sets Traditional solution of reliability block diagrams and fault trees involves the determination of the so-called minimal cut sets. Cut sets are the unique combinations of component failures that can cause system failure. Spe…

同時にに変数の値を変える nusmv コード

同時にに変数の値を変える nusmv コード MODULE main VAR var1 : boolean; var2 : boolean; ASSIGN init(var1) := TRUE; next(var1) := case TRUE : {TRUE, FALSE}; esac; init(var2) := TRUE; next(var2) := case TRUE : {TRUE, FALSE}; esac;実行例 NuSMV …