Skip to main content

Future Security: Processes or Properties?—Research Directions in Cybersecurity

  • Chapter
  • First Online:
Models, Mindsets, Meta: The What, the How, and the Why Not?

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11200))

Abstract

Security in critical infrastructures is a highly relevant topic and as the level of security of critical infrastructures needs to be increased the need for adequate methods and tools is apparent. “Processes and their properties” is the analysis perspective through which we revisit empirical data from our research on critical infrastructures to identify future research directions in security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Federal Office for Information Security: Recommendation for critical information infrastructure protection. Website about the protection of critical infrastructure maintained in cooperation by the BBK and the BSI. www.bsi.bund.de/EN/Topics/Criticalinfrastructures/criticalinfrastructures_node.html

  2. Bundesgesetzblatt: Gesetz zur Erhöhung der Sicherheit informationstechnischer Systeme (IT-Sicherheitsgesetz, Bundesgesetzblatt Jahrgang 2015 Teil I Nr. 31) (2015)

    Google Scholar 

  3. Kipker, D.-K., Müller, S.: Internationale Cybersecurity-Regulierung (2018)

    Google Scholar 

  4. Canzani, E., Kaufmann, H., Lechner, U.: An operator-driven approach for modeling interdependencies in critical infrastructures based on critical services and sectors. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 308–320. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71368-7_27

    Chapter  Google Scholar 

  5. Jähnichen, S., Wirsing, M.: Rigorous engineering of collective adaptive systems track introduction. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 535–538. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47166-2_37

    Chapter  Google Scholar 

  6. Howar, F., Isberner, M., Merten, M., Steffen, B., Beyer, D., Păsăreanu, C.S.: Rigorous examination of reactive systems. Int. J. Softw. Tools Technol. Transf. 16, 457–464 (2014)

    Article  Google Scholar 

  7. Boelmann, S., Neubauer, J., Naujokat, S., Steffen, B.: Model driven design of secure high assurance systems: an introduction to the open platform from the user perspective. In: Proceedings of the International Conference on Security and Management, p. 145 (2016)

    Google Scholar 

  8. Kunnappilly, A., Legay, A., Margaria, T., Seceleanu, C., Steffen, B., Traonouez, L.-M.: Analyzing ambient assisted living solutions: a research perspective. In: 12th International Conference on Design Technology of Integrated Systems in Nanoscale Era. S., pp. 1–7 (2017)

    Google Scholar 

  9. Varriale, A., Di Natale, G., Prinetto, P., Steffen, B., Margaria, T.: SEcubeTM: an open security platform - general approach and strategies. In: International Conference on Security and Management (SAM 16). S. pp. 131–137 (2016)

    Google Scholar 

  10. Lechner, U.: Monitor 2.0 IT-Sicherheit Kritischer Infrastrukturen (2018)

    Google Scholar 

  11. Bhanu, Y., et al.: A cyberthreat search process and service. In: ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy (2016)

    Google Scholar 

  12. Thaler, R.H., Sunstein, C.R.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale Univ Pr (2008)

    Google Scholar 

  13. Sorbi, M.J., Mak, S.B., Houtveen, J.H., Kleiboer, A.M., van Doornen, L.J.P., Sorbil, M.J.: Mobile Web-based monitoring and coaching: feasibility in chronic migraine. J. Med. Internet Res. 9, 14–23 (2007)

    Article  Google Scholar 

  14. Lechner, U., Dännart, S., Rieb, A., Rudel, S.: IT-Sicherheit in Kritischen Infrastrukturen: Fallstudien zur IT-Sicherheit in Kritischen Infrastrukturen. Logos Verlag, Berlin (2018)

    Book  Google Scholar 

  15. Dännart, S., Diefenbach, T., Hofmeier, M., Rieb, A., Lechner, U.: IT-Sicherheit in Kritischen Infrastrukturen – eine Fallstudien-basierte Analyse von Praxisbeispielen. In: Drews, P., Burkhardt, F., Niemeyer, P., und Xie, L. (Hrsg.) Konferenzband Multikonferenz Wirtschaftsinformatik 2018: Data driven X - Turning Data into Value. Leuphana Universität Lüneburg, Lüneburg (2018)

    Google Scholar 

  16. Yin, R.K.: The case study crisis: some answers. Adm. Sci. Q. 26, 58–65 (1981)

    Article  Google Scholar 

  17. Schubert, P., Wölfle, R.: The experience methodology for writing IS case studies. In: Americas Conference on Information Systems, pp. 19–30 (2006)

    Google Scholar 

  18. Eisenhardt, K.M.: Building theories from case study research. Acad. Manag. Rev. 14(4), 532–550 (1989)

    Article  Google Scholar 

  19. BSI: Industrial Control System Security: Top 10 Bedrohungen und Gegenmaßnahmen 2016 (2016)

    Google Scholar 

  20. Margaria, T., Steffen, B.: Service engineering: linking business and IT. Computer 39, 45–55 (2006)

    Article  Google Scholar 

  21. Hähnle, R., Steffen, B.: Constraint-based behavioral consistency of evolving software systems. BT - Machine Learning for Dynamic Software Analysis: Potentials and Limits - International Dagstuhl Seminar 16172, Dagstuhl Castle, Germany, 24–27 April 2016 (2016). Revised Papers, https://doi.org/10.1007/978-3-319-96562-8_8

    Google Scholar 

  22. Nissen, V., Stelzer, D., Straßburger, S., Hrsg, D.F.: Volker Nissen, Dirk Stelzer, Steffen Straßburger und Daniel Fischer (Hrsg.) Multikonferenz Wirtschaftsinformatik (MKWI) 2016 Band II. (2016)

    Google Scholar 

  23. Jasper, M., et al.: The RERS 2017 challenge and workshop (invited paper). In: BT - Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, Santa Barbara, CA, USA, July 10–14, 2017, (2017). http://doi.acm.org/10.1145/3092282.3098206

  24. Chadli, M., et al.: High-level frameworks for the specification and verification of scheduling problems. Int. J. Softw. Tools Technol. Transf. 20, 397–422 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This research is funded by the German Federal Ministry of Education and Research under grant number FKZ: 16KIS0213K. I would also like to thank all authors and coauthors and co-editors of the case study series, all case study partners and interviewees for the insights as well as our project partners from VeSiKi and our fellow projects from ITS|KRITIS for the support of the case study series. We also thank the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ulrike Lechner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lechner, U. (2019). Future Security: Processes or Properties?—Research Directions in Cybersecurity. In: Margaria, T., Graf, S., Larsen, K. (eds) Models, Mindsets, Meta: The What, the How, and the Why Not?. Lecture Notes in Computer Science(), vol 11200. Springer, Cham. https://doi.org/10.1007/978-3-030-22348-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22348-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22347-2

  • Online ISBN: 978-3-030-22348-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics