Refereed paper
Information security embedded in the design of telematics systems

https://doi.org/10.1016/S0167-4048(97)00003-5Get rights and content

Abstract

As organizations become increasingly dependent on their telematics systems, they become more vulnerable to interruptions and breakdowns of these systems. Most organizations only realize this dependency, and the exact nature of their vulnerability, once the telematics systems are in place. This often results in the ad hoc addition of safeguards, which causes operational problems. The most important cause of this phenomenon is the fact that information security requirements were never an issue during the design of most systems. In this paper we propose that requirements for information security should be integrated in the design process in an early phase. The benefit of this is that information security will become an integral part of the system. We present an approach that addresses the issue of security requirements in all stages of the design process. For each stage we discuss how these information security requirements can be embedded in that stage.

References (28)

  • D.E. Bell et al.

    Secure computer systems: unified exposition and multics interpretation

  • Code of practice for information security management

    (17 February, 1994)
  • P. Overbeek

    Towards secure open systems

  • W. Ford

    Computer Communications Security: Principals, Standard Protocols and Techniques

    (1994)
  • Cited by (11)

    • System security requirements: A framework for early identification, specification and measurement of related software requirements

      2019, Computer Standards and Interfaces
      Citation Excerpt :

      A number of researchers have investigated system/software security requirements, seeking to identify, specify and address such requirements in the early development phases. For example, Tettero et al. [19] defined security requirements as confidentiality, integrity, availability and authenticity of the systems. In addition, they proposed an approach for addressing security throughout the stages of the system design process.

    • Telematics systems in supply chains

      2017, Communications in Computer and Information Science
    • Next generation information-based infrastructures: New dependencies and threats

      2013, Critical Information Infrastructure Protection and Resilience in the ICT Sector
    View all citing articles on Scopus

    We define telematics as the support of interaction between people and/or processes while bridging distance and/or time, through the integrated application of information and telecommunication technology.

    a

    Olaf Tettero is associate member of scientific staff of the Telematics Research Centre, The Netherlands. He holds an M.Sc. in computer science. His current research interest focuses on information security and design processes. Presently he works on the design of a secure multimedia broadband platform.

    b

    Dirk Jan Out is member of the scientific staff of the Telematics Research Centre, The Netherlands. He holds an M.Sc. and Ph.D. in computer science. His current research interest focuses on broadband communications, information security, multimedia and tele-education.

    c

    Henry M. Franken is member of the scientific staff of the Telematics Research Centre, The Netherlands. He holds an M.Sc. and Ph.D. in electrical engineering. His current research interest focuses on applying systems engineering principles to telematics and business process (re)design.

    d

    Jeroen Schot is senior staff member of the Telematics Research Centre, The Netherlands. He holds a B.Sc., M.Sc. and Ph.D. in computer science. He manages the scientific project programme and is responsible for several research projects. His research interests are distributed systems design and methods for supporting this. He has been involved in many projects in the health care, mobile telecommunications, space and aviation, logistics and software development sectors.

    View full text