Abstract
Security in critical infrastructures is a highly relevant topic and as the level of security of critical infrastructures needs to be increased the need for adequate methods and tools is apparent. “Processes and their properties” is the analysis perspective through which we revisit empirical data from our research on critical infrastructures to identify future research directions in security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Federal Office for Information Security: Recommendation for critical information infrastructure protection. Website about the protection of critical infrastructure maintained in cooperation by the BBK and the BSI. www.bsi.bund.de/EN/Topics/Criticalinfrastructures/criticalinfrastructures_node.html
Bundesgesetzblatt: Gesetz zur Erhöhung der Sicherheit informationstechnischer Systeme (IT-Sicherheitsgesetz, Bundesgesetzblatt Jahrgang 2015 Teil I Nr. 31) (2015)
Kipker, D.-K., Müller, S.: Internationale Cybersecurity-Regulierung (2018)
Canzani, E., Kaufmann, H., Lechner, U.: An operator-driven approach for modeling interdependencies in critical infrastructures based on critical services and sectors. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 308–320. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71368-7_27
Jähnichen, S., Wirsing, M.: Rigorous engineering of collective adaptive systems track introduction. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 535–538. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47166-2_37
Howar, F., Isberner, M., Merten, M., Steffen, B., Beyer, D., Păsăreanu, C.S.: Rigorous examination of reactive systems. Int. J. Softw. Tools Technol. Transf. 16, 457–464 (2014)
Boelmann, S., Neubauer, J., Naujokat, S., Steffen, B.: Model driven design of secure high assurance systems: an introduction to the open platform from the user perspective. In: Proceedings of the International Conference on Security and Management, p. 145 (2016)
Kunnappilly, A., Legay, A., Margaria, T., Seceleanu, C., Steffen, B., Traonouez, L.-M.: Analyzing ambient assisted living solutions: a research perspective. In: 12th International Conference on Design Technology of Integrated Systems in Nanoscale Era. S., pp. 1–7 (2017)
Varriale, A., Di Natale, G., Prinetto, P., Steffen, B., Margaria, T.: SEcubeTM: an open security platform - general approach and strategies. In: International Conference on Security and Management (SAM 16). S. pp. 131–137 (2016)
Lechner, U.: Monitor 2.0 IT-Sicherheit Kritischer Infrastrukturen (2018)
Bhanu, Y., et al.: A cyberthreat search process and service. In: ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy (2016)
Thaler, R.H., Sunstein, C.R.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale Univ Pr (2008)
Sorbi, M.J., Mak, S.B., Houtveen, J.H., Kleiboer, A.M., van Doornen, L.J.P., Sorbil, M.J.: Mobile Web-based monitoring and coaching: feasibility in chronic migraine. J. Med. Internet Res. 9, 14–23 (2007)
Lechner, U., Dännart, S., Rieb, A., Rudel, S.: IT-Sicherheit in Kritischen Infrastrukturen: Fallstudien zur IT-Sicherheit in Kritischen Infrastrukturen. Logos Verlag, Berlin (2018)
Dännart, S., Diefenbach, T., Hofmeier, M., Rieb, A., Lechner, U.: IT-Sicherheit in Kritischen Infrastrukturen – eine Fallstudien-basierte Analyse von Praxisbeispielen. In: Drews, P., Burkhardt, F., Niemeyer, P., und Xie, L. (Hrsg.) Konferenzband Multikonferenz Wirtschaftsinformatik 2018: Data driven X - Turning Data into Value. Leuphana Universität Lüneburg, Lüneburg (2018)
Yin, R.K.: The case study crisis: some answers. Adm. Sci. Q. 26, 58–65 (1981)
Schubert, P., Wölfle, R.: The experience methodology for writing IS case studies. In: Americas Conference on Information Systems, pp. 19–30 (2006)
Eisenhardt, K.M.: Building theories from case study research. Acad. Manag. Rev. 14(4), 532–550 (1989)
BSI: Industrial Control System Security: Top 10 Bedrohungen und Gegenmaßnahmen 2016 (2016)
Margaria, T., Steffen, B.: Service engineering: linking business and IT. Computer 39, 45–55 (2006)
Hähnle, R., Steffen, B.: Constraint-based behavioral consistency of evolving software systems. BT - Machine Learning for Dynamic Software Analysis: Potentials and Limits - International Dagstuhl Seminar 16172, Dagstuhl Castle, Germany, 24–27 April 2016 (2016). Revised Papers, https://doi.org/10.1007/978-3-319-96562-8_8
Nissen, V., Stelzer, D., Straßburger, S., Hrsg, D.F.: Volker Nissen, Dirk Stelzer, Steffen Straßburger und Daniel Fischer (Hrsg.) Multikonferenz Wirtschaftsinformatik (MKWI) 2016 Band II. (2016)
Jasper, M., et al.: The RERS 2017 challenge and workshop (invited paper). In: BT - Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, Santa Barbara, CA, USA, July 10–14, 2017, (2017). http://doi.acm.org/10.1145/3092282.3098206
Chadli, M., et al.: High-level frameworks for the specification and verification of scheduling problems. Int. J. Softw. Tools Technol. Transf. 20, 397–422 (2018)
Acknowledgements
This research is funded by the German Federal Ministry of Education and Research under grant number FKZ: 16KIS0213K. I would also like to thank all authors and coauthors and co-editors of the case study series, all case study partners and interviewees for the insights as well as our project partners from VeSiKi and our fellow projects from ITS|KRITIS for the support of the case study series. We also thank the anonymous reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lechner, U. (2019). Future Security: Processes or Properties?—Research Directions in Cybersecurity. In: Margaria, T., Graf, S., Larsen, K. (eds) Models, Mindsets, Meta: The What, the How, and the Why Not?. Lecture Notes in Computer Science(), vol 11200. Springer, Cham. https://doi.org/10.1007/978-3-030-22348-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-22348-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22347-2
Online ISBN: 978-3-030-22348-9
eBook Packages: Computer ScienceComputer Science (R0)