Refereed paperInformation security embedded in the design of telematics systems☆
References (28)
- et al.
Integrating security activities into the software development lifecycle and the software Quality assurance process
Computers & Security
(1986) Security architecture for ODP systems, final results of the CEC COST-11 Ter “Security” project
Computer Networks and ISDN Systems
(1994)- et al.
A methodology to include computer security, safety and resilience requirements as part of the user requirement
Computers & Security
(1994) The structure of design processes
Deficiencies of the traditional approach to information security and the requirements for a new methodology
Computers & Security
(1995)Critical connections: communications for the future
Informatiebeveiliging: state of the art
(1993)Developing policies, procedures and information security systems
- et al.
Informatiebeveiliging, een blik achter de schermen
- et al.
A methodology for the development of secure application systems
Secure computer systems: unified exposition and multics interpretation
Code of practice for information security management
Towards secure open systems
Computer Communications Security: Principals, Standard Protocols and Techniques
Cited by (11)
System security requirements: A framework for early identification, specification and measurement of related software requirements
2019, Computer Standards and InterfacesCitation Excerpt :A number of researchers have investigated system/software security requirements, seeking to identify, specify and address such requirements in the early development phases. For example, Tettero et al. [19] defined security requirements as confidentiality, integrity, availability and authenticity of the systems. In addition, they proposed an approach for addressing security throughout the stages of the system design process.
Holistic security requirement engineering for electronic commerce
2004, Computers and SecurityIntegrating software lifecycle process standards with security engineering
2002, Computers and SecuritySoftware Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up
2020, ACM International Conference Proceeding SeriesTelematics systems in supply chains
2017, Communications in Computer and Information ScienceNext generation information-based infrastructures: New dependencies and threats
2013, Critical Information Infrastructure Protection and Resilience in the ICT Sector
- ☆
We define telematics as the support of interaction between people and/or processes while bridging distance and/or time, through the integrated application of information and telecommunication technology.
- a
Olaf Tettero is associate member of scientific staff of the Telematics Research Centre, The Netherlands. He holds an M.Sc. in computer science. His current research interest focuses on information security and design processes. Presently he works on the design of a secure multimedia broadband platform.
- b
Dirk Jan Out is member of the scientific staff of the Telematics Research Centre, The Netherlands. He holds an M.Sc. and Ph.D. in computer science. His current research interest focuses on broadband communications, information security, multimedia and tele-education.
- c
Henry M. Franken is member of the scientific staff of the Telematics Research Centre, The Netherlands. He holds an M.Sc. and Ph.D. in electrical engineering. His current research interest focuses on applying systems engineering principles to telematics and business process (re)design.
- d
Jeroen Schot is senior staff member of the Telematics Research Centre, The Netherlands. He holds a B.Sc., M.Sc. and Ph.D. in computer science. He manages the scientific project programme and is responsible for several research projects. His research interests are distributed systems design and methods for supporting this. He has been involved in many projects in the health care, mobile telecommunications, space and aviation, logistics and software development sectors.