dc.contributor.author | Blanco Bueno, Carlos | |
dc.contributor.author | Rosado, David G. | |
dc.contributor.author | Varela Vaca, Ángel Jesús | |
dc.contributor.author | Gómez Lopez, María Teresa | |
dc.contributor.author | Fernández Medina, Eduardo | |
dc.contributor.other | Universidad de Cantabria | es_ES |
dc.date.accessioned | 2024-05-21T15:44:39Z | |
dc.date.available | 2024-05-21T15:44:39Z | |
dc.date.issued | 2023-12 | |
dc.identifier.issn | 2542-6605 | |
dc.identifier.issn | 2543-1536 | |
dc.identifier.other | TED2021-130355B-C31 | es_ES |
dc.identifier.other | TED2021-130355A-C33 | es_ES |
dc.identifier.other | TED2021-130355B-C32 | es_ES |
dc.identifier.other | PID2020-112540RB-C42 | es_ES |
dc.identifier.other | PID2020-112540RB-C44 | es_ES |
dc.identifier.uri | https://hdl.handle.net/10902/32893 | |
dc.description.abstract | In the last years, Cyber-physical systems (CPS) have attracted substantial mainstream, especially in the industrial sector, since they have become the focus of cyber-attacks. CPS are complex systems that encompass a great variety of hardware and software components with a countless number of configurations and features. For this reason, the construction, validation, and diagnosis of security in CPS become a major challenge. An invalid security requirement for the CPS can produce partial or incomplete configuration, even misconfigurations, and hence catastrophic consequences. Therefore, it is crucial to ensure the validation of the security requirements specification from the earlier design stages. To this end, Onto-CARMEN is
proposed, a semantic approach that enables the automatic verification and diagnosis of security requirements according to the ENISA and OWASP recommendations. Our approach provides a mechanism for the specification of security requirements on top of ontologies, and automatic diagnosis through semantic axioms and SPARQL rules. The approach has been validated using security requirements from a real case study. | es_ES |
dc.description.sponsorship | This work has been developed within the ALBA-UCLM (TED2021-130355B-C31), ALBA-UC (TED2021-130355A-C33), ALBA-US (TED2021-130355B-C32) funded by AETHER-UCLM/10.13039/501100011033/Unión Europea NextGenerationEU/PRTR, AETHERUCLM (PID2020-112540RB-C42/AEI/10.13039/501100011033), AETHER-US (PID2020-112540RB-C44/AEI/10.13039/5011000 11033), PRESECREL (MCIN/AEI/10.13039/501100011033/), COPERNICA (P20_01224) and METAMORFOSIS (US-1381375). | es_ES |
dc.format.extent | 16 p. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Elsevier | es_ES |
dc.rights | © 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/). | es_ES |
dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | * |
dc.source | Internet of Things, 2023, 24, 100989 | es_ES |
dc.subject.other | Cyber–physical system | es_ES |
dc.subject.other | Cybersecurity | es_ES |
dc.subject.other | Security | es_ES |
dc.subject.other | Configuration models | es_ES |
dc.subject.other | Security requirements | es_ES |
dc.subject.other | Security verification | es_ES |
dc.subject.other | Diagnosis | es_ES |
dc.title | Onto-CARMEN: ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning | es_ES |
dc.type | info:eu-repo/semantics/article | es_ES |
dc.relation.publisherVersion | https://doi.org/10.1016/j.iot.2023.100989 | es_ES |
dc.rights.accessRights | openAccess | es_ES |
dc.identifier.DOI | 10.1016/j.iot.2023.100989 | |
dc.type.version | publishedVersion | es_ES |