A model-driven approach for vulnerability evaluation of modern physical protection systems
Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a pr...
Ausführliche Beschreibung
Autor*in: |
Drago, Annarita [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer-Verlag Berlin Heidelberg 2016 |
---|
Übergeordnetes Werk: |
Enthalten in: Software and systems modeling - Springer Berlin Heidelberg, 2002, 18(2016), 1 vom: 26. Dez., Seite 523-556 |
---|---|
Übergeordnetes Werk: |
volume:18 ; year:2016 ; number:1 ; day:26 ; month:12 ; pages:523-556 |
Links: |
---|
DOI / URN: |
10.1007/s10270-016-0572-7 |
---|
Katalog-ID: |
OLC2044248158 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2044248158 | ||
003 | DE-627 | ||
005 | 20230502181517.0 | ||
007 | tu | ||
008 | 200820s2016 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s10270-016-0572-7 |2 doi | |
035 | |a (DE-627)OLC2044248158 | ||
035 | |a (DE-He213)s10270-016-0572-7-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q VZ |
082 | 0 | 4 | |a 004 |q VZ |
084 | |a 54.50$jProgrammierung: Allgemeines |2 bkl | ||
100 | 1 | |a Drago, Annarita |e verfasserin |4 aut | |
245 | 1 | 0 | |a A model-driven approach for vulnerability evaluation of modern physical protection systems |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer-Verlag Berlin Heidelberg 2016 | ||
520 | |a Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. | ||
650 | 4 | |a Physical security | |
650 | 4 | |a Vulnerability | |
650 | 4 | |a CIP_VAM UML profile | |
650 | 4 | |a Bayesian Network | |
650 | 4 | |a Model transformation | |
650 | 4 | |a Railway infrastructure system | |
700 | 1 | |a Marrone, Stefano |4 aut | |
700 | 1 | |a Mazzocca, Nicola |4 aut | |
700 | 1 | |a Nardone, Roberto |4 aut | |
700 | 1 | |a Tedesco, Annarita |4 aut | |
700 | 1 | |a Vittorini, Valeria |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Software and systems modeling |d Springer Berlin Heidelberg, 2002 |g 18(2016), 1 vom: 26. Dez., Seite 523-556 |w (DE-627)356568156 |w (DE-600)2092265-6 |w (DE-576)10203768X |x 1619-1366 |7 nnns |
773 | 1 | 8 | |g volume:18 |g year:2016 |g number:1 |g day:26 |g month:12 |g pages:523-556 |
856 | 4 | 1 | |u https://doi.org/10.1007/s10270-016-0572-7 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2018 | ||
912 | |a GBV_ILN_2244 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4277 | ||
936 | b | k | |a 54.50$jProgrammierung: Allgemeines |q VZ |0 181569876 |0 (DE-625)181569876 |
951 | |a AR | ||
952 | |d 18 |j 2016 |e 1 |b 26 |c 12 |h 523-556 |
author_variant |
a d ad s m sm n m nm r n rn a t at v v vv |
---|---|
matchkey_str |
article:16191366:2016----::mdlrvnprahovleaiiyvlainfoenh |
hierarchy_sort_str |
2016 |
bklnumber |
54.50$jProgrammierung: Allgemeines |
publishDate |
2016 |
allfields |
10.1007/s10270-016-0572-7 doi (DE-627)OLC2044248158 (DE-He213)s10270-016-0572-7-p DE-627 ger DE-627 rakwb eng 004 VZ 004 VZ 54.50$jProgrammierung: Allgemeines bkl Drago, Annarita verfasserin aut A model-driven approach for vulnerability evaluation of modern physical protection systems 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2016 Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system Marrone, Stefano aut Mazzocca, Nicola aut Nardone, Roberto aut Tedesco, Annarita aut Vittorini, Valeria aut Enthalten in Software and systems modeling Springer Berlin Heidelberg, 2002 18(2016), 1 vom: 26. Dez., Seite 523-556 (DE-627)356568156 (DE-600)2092265-6 (DE-576)10203768X 1619-1366 nnns volume:18 year:2016 number:1 day:26 month:12 pages:523-556 https://doi.org/10.1007/s10270-016-0572-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2018 GBV_ILN_2244 GBV_ILN_4046 GBV_ILN_4277 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 AR 18 2016 1 26 12 523-556 |
spelling |
10.1007/s10270-016-0572-7 doi (DE-627)OLC2044248158 (DE-He213)s10270-016-0572-7-p DE-627 ger DE-627 rakwb eng 004 VZ 004 VZ 54.50$jProgrammierung: Allgemeines bkl Drago, Annarita verfasserin aut A model-driven approach for vulnerability evaluation of modern physical protection systems 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2016 Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system Marrone, Stefano aut Mazzocca, Nicola aut Nardone, Roberto aut Tedesco, Annarita aut Vittorini, Valeria aut Enthalten in Software and systems modeling Springer Berlin Heidelberg, 2002 18(2016), 1 vom: 26. Dez., Seite 523-556 (DE-627)356568156 (DE-600)2092265-6 (DE-576)10203768X 1619-1366 nnns volume:18 year:2016 number:1 day:26 month:12 pages:523-556 https://doi.org/10.1007/s10270-016-0572-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2018 GBV_ILN_2244 GBV_ILN_4046 GBV_ILN_4277 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 AR 18 2016 1 26 12 523-556 |
allfields_unstemmed |
10.1007/s10270-016-0572-7 doi (DE-627)OLC2044248158 (DE-He213)s10270-016-0572-7-p DE-627 ger DE-627 rakwb eng 004 VZ 004 VZ 54.50$jProgrammierung: Allgemeines bkl Drago, Annarita verfasserin aut A model-driven approach for vulnerability evaluation of modern physical protection systems 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2016 Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system Marrone, Stefano aut Mazzocca, Nicola aut Nardone, Roberto aut Tedesco, Annarita aut Vittorini, Valeria aut Enthalten in Software and systems modeling Springer Berlin Heidelberg, 2002 18(2016), 1 vom: 26. Dez., Seite 523-556 (DE-627)356568156 (DE-600)2092265-6 (DE-576)10203768X 1619-1366 nnns volume:18 year:2016 number:1 day:26 month:12 pages:523-556 https://doi.org/10.1007/s10270-016-0572-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2018 GBV_ILN_2244 GBV_ILN_4046 GBV_ILN_4277 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 AR 18 2016 1 26 12 523-556 |
allfieldsGer |
10.1007/s10270-016-0572-7 doi (DE-627)OLC2044248158 (DE-He213)s10270-016-0572-7-p DE-627 ger DE-627 rakwb eng 004 VZ 004 VZ 54.50$jProgrammierung: Allgemeines bkl Drago, Annarita verfasserin aut A model-driven approach for vulnerability evaluation of modern physical protection systems 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2016 Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system Marrone, Stefano aut Mazzocca, Nicola aut Nardone, Roberto aut Tedesco, Annarita aut Vittorini, Valeria aut Enthalten in Software and systems modeling Springer Berlin Heidelberg, 2002 18(2016), 1 vom: 26. Dez., Seite 523-556 (DE-627)356568156 (DE-600)2092265-6 (DE-576)10203768X 1619-1366 nnns volume:18 year:2016 number:1 day:26 month:12 pages:523-556 https://doi.org/10.1007/s10270-016-0572-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2018 GBV_ILN_2244 GBV_ILN_4046 GBV_ILN_4277 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 AR 18 2016 1 26 12 523-556 |
allfieldsSound |
10.1007/s10270-016-0572-7 doi (DE-627)OLC2044248158 (DE-He213)s10270-016-0572-7-p DE-627 ger DE-627 rakwb eng 004 VZ 004 VZ 54.50$jProgrammierung: Allgemeines bkl Drago, Annarita verfasserin aut A model-driven approach for vulnerability evaluation of modern physical protection systems 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2016 Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system Marrone, Stefano aut Mazzocca, Nicola aut Nardone, Roberto aut Tedesco, Annarita aut Vittorini, Valeria aut Enthalten in Software and systems modeling Springer Berlin Heidelberg, 2002 18(2016), 1 vom: 26. Dez., Seite 523-556 (DE-627)356568156 (DE-600)2092265-6 (DE-576)10203768X 1619-1366 nnns volume:18 year:2016 number:1 day:26 month:12 pages:523-556 https://doi.org/10.1007/s10270-016-0572-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2018 GBV_ILN_2244 GBV_ILN_4046 GBV_ILN_4277 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 AR 18 2016 1 26 12 523-556 |
language |
English |
source |
Enthalten in Software and systems modeling 18(2016), 1 vom: 26. Dez., Seite 523-556 volume:18 year:2016 number:1 day:26 month:12 pages:523-556 |
sourceStr |
Enthalten in Software and systems modeling 18(2016), 1 vom: 26. Dez., Seite 523-556 volume:18 year:2016 number:1 day:26 month:12 pages:523-556 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Software and systems modeling |
authorswithroles_txt_mv |
Drago, Annarita @@aut@@ Marrone, Stefano @@aut@@ Mazzocca, Nicola @@aut@@ Nardone, Roberto @@aut@@ Tedesco, Annarita @@aut@@ Vittorini, Valeria @@aut@@ |
publishDateDaySort_date |
2016-12-26T00:00:00Z |
hierarchy_top_id |
356568156 |
dewey-sort |
14 |
id |
OLC2044248158 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2044248158</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502181517.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200820s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10270-016-0572-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2044248158</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10270-016-0572-7-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Drago, Annarita</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A model-driven approach for vulnerability evaluation of modern physical protection systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag Berlin Heidelberg 2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physical security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vulnerability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CIP_VAM UML profile</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bayesian Network</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Model transformation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Railway infrastructure system</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marrone, Stefano</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazzocca, Nicola</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nardone, Roberto</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tedesco, Annarita</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vittorini, Valeria</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Software and systems modeling</subfield><subfield code="d">Springer Berlin Heidelberg, 2002</subfield><subfield code="g">18(2016), 1 vom: 26. Dez., Seite 523-556</subfield><subfield code="w">(DE-627)356568156</subfield><subfield code="w">(DE-600)2092265-6</subfield><subfield code="w">(DE-576)10203768X</subfield><subfield code="x">1619-1366</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:18</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:1</subfield><subfield code="g">day:26</subfield><subfield code="g">month:12</subfield><subfield code="g">pages:523-556</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10270-016-0572-7</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2244</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="q">VZ</subfield><subfield code="0">181569876</subfield><subfield code="0">(DE-625)181569876</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">18</subfield><subfield code="j">2016</subfield><subfield code="e">1</subfield><subfield code="b">26</subfield><subfield code="c">12</subfield><subfield code="h">523-556</subfield></datafield></record></collection>
|
author |
Drago, Annarita |
spellingShingle |
Drago, Annarita ddc 004 bkl 54.50$jProgrammierung: Allgemeines misc Physical security misc Vulnerability misc CIP_VAM UML profile misc Bayesian Network misc Model transformation misc Railway infrastructure system A model-driven approach for vulnerability evaluation of modern physical protection systems |
authorStr |
Drago, Annarita |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)356568156 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1619-1366 |
topic_title |
004 VZ 54.50$jProgrammierung: Allgemeines bkl A model-driven approach for vulnerability evaluation of modern physical protection systems Physical security Vulnerability CIP_VAM UML profile Bayesian Network Model transformation Railway infrastructure system |
topic |
ddc 004 bkl 54.50$jProgrammierung: Allgemeines misc Physical security misc Vulnerability misc CIP_VAM UML profile misc Bayesian Network misc Model transformation misc Railway infrastructure system |
topic_unstemmed |
ddc 004 bkl 54.50$jProgrammierung: Allgemeines misc Physical security misc Vulnerability misc CIP_VAM UML profile misc Bayesian Network misc Model transformation misc Railway infrastructure system |
topic_browse |
ddc 004 bkl 54.50$jProgrammierung: Allgemeines misc Physical security misc Vulnerability misc CIP_VAM UML profile misc Bayesian Network misc Model transformation misc Railway infrastructure system |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Software and systems modeling |
hierarchy_parent_id |
356568156 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Software and systems modeling |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)356568156 (DE-600)2092265-6 (DE-576)10203768X |
title |
A model-driven approach for vulnerability evaluation of modern physical protection systems |
ctrlnum |
(DE-627)OLC2044248158 (DE-He213)s10270-016-0572-7-p |
title_full |
A model-driven approach for vulnerability evaluation of modern physical protection systems |
author_sort |
Drago, Annarita |
journal |
Software and systems modeling |
journalStr |
Software and systems modeling |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
txt |
container_start_page |
523 |
author_browse |
Drago, Annarita Marrone, Stefano Mazzocca, Nicola Nardone, Roberto Tedesco, Annarita Vittorini, Valeria |
container_volume |
18 |
class |
004 VZ 54.50$jProgrammierung: Allgemeines bkl |
format_se |
Aufsätze |
author-letter |
Drago, Annarita |
doi_str_mv |
10.1007/s10270-016-0572-7 |
normlink |
181569876 |
normlink_prefix_str_mv |
181569876 (DE-625)181569876 |
dewey-full |
004 |
title_sort |
a model-driven approach for vulnerability evaluation of modern physical protection systems |
title_auth |
A model-driven approach for vulnerability evaluation of modern physical protection systems |
abstract |
Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. © Springer-Verlag Berlin Heidelberg 2016 |
abstractGer |
Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. © Springer-Verlag Berlin Heidelberg 2016 |
abstract_unstemmed |
Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy. © Springer-Verlag Berlin Heidelberg 2016 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 GBV_ILN_2018 GBV_ILN_2244 GBV_ILN_4046 GBV_ILN_4277 |
container_issue |
1 |
title_short |
A model-driven approach for vulnerability evaluation of modern physical protection systems |
url |
https://doi.org/10.1007/s10270-016-0572-7 |
remote_bool |
false |
author2 |
Marrone, Stefano Mazzocca, Nicola Nardone, Roberto Tedesco, Annarita Vittorini, Valeria |
author2Str |
Marrone, Stefano Mazzocca, Nicola Nardone, Roberto Tedesco, Annarita Vittorini, Valeria |
ppnlink |
356568156 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10270-016-0572-7 |
up_date |
2024-07-03T22:47:23.646Z |
_version_ |
1803599839161745410 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2044248158</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502181517.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200820s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10270-016-0572-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2044248158</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10270-016-0572-7-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Drago, Annarita</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A model-driven approach for vulnerability evaluation of modern physical protection systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag Berlin Heidelberg 2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different system configurations. Hence, the proposed approach is useful both in the context of vulnerability assessment and in designing new security systems as it enables what-if and cost–benefit analyses. A real-world case study is further illustrated in order to validate and demonstrate the potentiality of the approach. Specifically, two attack scenarios are considered against the depot of a mass transit transportation system in Milan, Italy.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physical security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vulnerability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CIP_VAM UML profile</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bayesian Network</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Model transformation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Railway infrastructure system</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marrone, Stefano</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazzocca, Nicola</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nardone, Roberto</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tedesco, Annarita</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vittorini, Valeria</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Software and systems modeling</subfield><subfield code="d">Springer Berlin Heidelberg, 2002</subfield><subfield code="g">18(2016), 1 vom: 26. Dez., Seite 523-556</subfield><subfield code="w">(DE-627)356568156</subfield><subfield code="w">(DE-600)2092265-6</subfield><subfield code="w">(DE-576)10203768X</subfield><subfield code="x">1619-1366</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:18</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:1</subfield><subfield code="g">day:26</subfield><subfield code="g">month:12</subfield><subfield code="g">pages:523-556</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10270-016-0572-7</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2244</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="q">VZ</subfield><subfield code="0">181569876</subfield><subfield code="0">(DE-625)181569876</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">18</subfield><subfield code="j">2016</subfield><subfield code="e">1</subfield><subfield code="b">26</subfield><subfield code="c">12</subfield><subfield code="h">523-556</subfield></datafield></record></collection>
|
score |
7.4007063 |