{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:33:33Z","timestamp":1743046413248,"version":"3.40.3"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030142902"},{"type":"electronic","value":"9783030142919"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-14291-9_2","type":"book-chapter","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T12:24:37Z","timestamp":1550751877000},"page":"22-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Safety Architecture Pattern System with Security Aspects"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Preschern","sequence":"first","affiliation":[]},{"given":"Nermin","family":"Kajtazovic","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kreiner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"unstructured":"Antonino, P.O., Keuler, T., Antonino, P.: Towards an approach to represent safety patterns. In: The Seventh International Conference on Software Engineering Advances (ICSEA), pp. 228\u2013237 (2012)","key":"2_CR1"},{"doi-asserted-by":"crossref","unstructured":"Armoush, A.: Design patterns for safety-critical embedded systems. Ph.D. thesis. RWTH Aachen University (2010)","key":"2_CR2","DOI":"10.1109\/SEAA.2009.12"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1, 1 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"unstructured":"Babar, M.A.: Improving the reuse of pattern-based knowledge in software architecting. In: EuroPLoP, Lero, Ireland, pp. 7\u201311 (2007)","key":"2_CR4"},{"doi-asserted-by":"crossref","unstructured":"Bachmann, F., Bass, L., Klein, M.: Deriving architectural tactics: a step toward methodical architectural design. Techncial report, March, Carnegie Mellon Software Engineering Institute (2003)","key":"2_CR5","DOI":"10.21236\/ADA413701"},{"unstructured":"Buckley, I., Fernandez, E.B., Larrondo-Petrie, M.M.: Patterns combining reliability and security. In: The Third International Conferences on Pervasive Patterns and Applications, PATTERNS 2011 (2011)","key":"2_CR6"},{"key":"2_CR7","volume-title":"Pattern-Oriented Software Architecture: A System of Patterns","author":"F Buschmann","year":"1996","unstructured":"Buschmann, F., et al.: Pattern-Oriented Software Architecture: A System of Patterns. Wiley, Hoboken (1996)"},{"doi-asserted-by":"crossref","unstructured":"Cockram, T.J., Lautieri, S.R.: Combining security and safety principle in practice. In: 2nd Institution of Engineering and Technology International Conference on System Safety, pp. 159\u2013164. IEEE (2007)","key":"2_CR8","DOI":"10.1049\/cp:20070458"},{"unstructured":"Committee on National Security Systems: National Information Assurance Glossary. CNSS Instruction No. 4009 (2010)","key":"2_CR9"},{"unstructured":"Daniels, F., Kim, K., Vouk, M.A.: The reliable hybrid pattern a generalized software fault tolerant design pattern. In: European Conference on Pattern Language of Programs (EuroPLoP), pp. 1\u20139 (1997)","key":"2_CR10"},{"unstructured":"Dasarathy, B.: Cyber security definitions and academic landscape. In: NPSMA Workshop (2013)","key":"2_CR11"},{"key":"2_CR12","first-page":"862","volume":"70","author":"BP Douglass","year":"1998","unstructured":"Douglass, B.P.: Safety-critical systems design. Electron. Eng. 70, 862 (1998)","journal-title":"Electron. Eng."},{"key":"2_CR13","volume-title":"Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems","author":"BP Douglass","year":"2002","unstructured":"Douglass, B.P.: Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. Pearson, London (2002)"},{"key":"2_CR14","volume-title":"Design Patterns for Embedded Systems in C","author":"BP Douglass","year":"2010","unstructured":"Douglass, B.P.: Design Patterns for Embedded Systems in C. Elsevier, Amsterdam (2010)"},{"doi-asserted-by":"crossref","unstructured":"Douglass, B.P.: Software design architecture patterns for embedded systems, chap. In: Software Engineering for Embedded Systems. Elsevier (2013)","key":"2_CR15","DOI":"10.1016\/B978-0-12-415917-4.00004-9"},{"issue":"2","key":"2_CR16","first-page":"6","volume":"18","author":"H Gawand","year":"2011","unstructured":"Gawand, H., Mundada, R.S., Swaminathan, P.: Design patterns to implement safety and fault tolerance. Int. J. Comput. Appl. 18(2), 6\u201313 (2011)","journal-title":"Int. J. Comput. Appl."},{"unstructured":"Grunske, L.: Transformational patterns for the improvement of safety properties in architectural specification. In: Proceedings of The Second Nordic Conference on Pattern Languages of Programs (VikingPLoP) (2003)","key":"2_CR17"},{"unstructured":"GSN Working Group: GSN Community Standard Version 1 (2011). http:\/\/www.goalstructuringnotation.info\/","key":"2_CR18"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-30191-2_11","volume-title":"Information and Communications Security","author":"ST Halkidis","year":"2004","unstructured":"Halkidis, S.T., Chatzigeorgiou, A., Stephanides, G.: A qualitative evaluation of security patterns. In: Lopez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 132\u2013144. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30191-2_11"},{"doi-asserted-by":"crossref","unstructured":"Halkidis, S., Chatzigeorgiou, A., Stephanides, G.: A qualitative analysis of software security patterns. Comput. Secur. 25(5), 379\u2013392 (2006a)","key":"2_CR20","DOI":"10.1016\/j.cose.2006.03.002"},{"doi-asserted-by":"publisher","unstructured":"Halkidis, S.T., Chatzigeorgiou, A., Stephanides, G.: Quantitative evaluation of systems with security patterns using a fuzzy approach. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4277, pp. 554\u2013564. Springer, Heidelberg (2006b). https:\/\/doi.org\/10.1007\/11915034_79","key":"2_CR21","DOI":"10.1007\/11915034_79"},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TDSC.2007.70240","volume":"5","author":"S Halkidis","year":"2008","unstructured":"Halkidis, S., Tsantalis, N., et al.: Architectural risk analysis of software systems based on security patterns. IEEE Trans. Dependable Secure Comput. 5(3), 129\u2013142 (2008)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Hamid, B., Desnos, N., et al.: Model-based security and dependability patterns in RCES - the TERESA approach. In: Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems - S&D4RCES 2010. ACM Press (2010)","key":"2_CR23","DOI":"10.1145\/1868433.1868444"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-38911-5_5","volume-title":"SDL 2013: Model-Driven Dependability Engineering","author":"B Hamid","year":"2013","unstructured":"Hamid, B., Geisel, J., Ziani, A., Bruel, J.-M., Perez, J.: Model-driven engineering for trusted embedded systems based on security and dependability patterns. In: Khendek, F., Toeroe, M., Gherbi, A., Reed, R. (eds.) SDL 2013. LNCS, vol. 7916, pp. 72\u201390. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38911-5_5"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-1-4471-2494-8_11","volume-title":"Achieving Systems Safety","author":"P Hampton","year":"2012","unstructured":"Hampton, P.: Survey of safety architectural patterns. In: Dale, C., Anderson, T. (eds.) Achieving Systems Safety, pp. 137\u2013158. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2494-8_11"},{"key":"2_CR26","volume-title":"Patterns for Fault Tolerant Software","author":"RS Hanmer","year":"2007","unstructured":"Hanmer, R.S.: Patterns for Fault Tolerant Software. Wiley, Hoboken (2007)"},{"doi-asserted-by":"crossref","unstructured":"Hansen, K.: Security attack analysis of safety systems. In: IEEE Conference on Emerging Technologies and Factory Automation, pp. 1\u20134, September 2009","key":"2_CR27","DOI":"10.1109\/ETFA.2009.5347258"},{"doi-asserted-by":"crossref","unstructured":"Harrison, N.B., Avgeriou, P.: Incorporating fault tolerance tactics in software architecture patterns. In: Proceedings of the 2008 RISE\/EFTS Joint International Workshop on Software Engineering for Resilient Systems - SERENE 2008. ACM Press (2008)","key":"2_CR28","DOI":"10.1145\/1479772.1479775"},{"unstructured":"Howard, M., LeBlanc, D.: Writing Secure Code. Microsoft Press (2003)","key":"2_CR29"},{"unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press (2006)","key":"2_CR30"},{"unstructured":"International Electrotechnical Commission: IEC 61508, Functional Safety of Electrical\/ Electronic\/ Programmable Electronic Safety Related Systems (2010)","key":"2_CR31"},{"unstructured":"Johnson, C., Yepez, A.: Cyber security threats to safety-critical space-based infrastructures. In: Proceedings of the Fifth Conference of the International Association for the Advancement of Space Safety, no. 1 (2011a)","key":"2_CR32"},{"unstructured":"Johnson, C., Yepez, A.: Mapping the impact of security threats on safety-critical global navigation satellite systems. In: Proceedings of the 29th International Systems Safety Society, no. 1. International Systems Safety Society (2011b)","key":"2_CR33"},{"unstructured":"Kelly, T., Weaver, R.: The goal structuring notation, a safety argument notation. In: Proceedings of the Dependable Systems and Networks Conference (2004)","key":"2_CR34"},{"doi-asserted-by":"crossref","unstructured":"Kumar, K., Prabhakar, T.V.: Design decision topology model for pattern relationship analysis. In: 1st Asian Conference on Pattern Languages of Programs (AsianPLoP 2010) (2010a)","key":"2_CR35","DOI":"10.1145\/2371736.2371740"},{"doi-asserted-by":"crossref","unstructured":"Kumar, K., Prabhakar, T.V.: Pattern-oriented knowledge model for architecture design. In: 17th Conference on Pattern Languages of Programs (PLoP) (2010b)","key":"2_CR36","DOI":"10.1145\/2493288.2493311"},{"key":"2_CR37","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8179.001.0001","volume-title":"Engineering a Safer World","author":"NG Leveson","year":"2012","unstructured":"Leveson, N.G.: Engineering a Safer World. MIT Press, Cambridge (2012)"},{"issue":"9","key":"2_CR38","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"I Nai-Fovino","year":"2009","unstructured":"Nai-Fovino, I., Masera, M., De-Cian, A.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9), 1394\u20131402 (2009)","journal-title":"Reliab. Eng. Syst. Saf."},{"unstructured":"Olivera, A.R.: Taim: a safety pattern repository. B.Sc. thesis. Federal University of Rio Grande do sul (2012)","key":"2_CR39"},{"doi-asserted-by":"crossref","unstructured":"Preschern, C., Kajtazovic, N., Kreiner, C.: Built-in security enhancements for the 1oo2 safety architecture. In: International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 103\u2013108. IEEE (2012a)","key":"2_CR40","DOI":"10.1109\/CYBER.2012.6392534"},{"unstructured":"Preschern, C., Kajtazovic, N., Kreiner, C.: Catalog of security tactics linked to common criteria requirements. In: 19th Conference on Pattern Languages of Programs (PLoP) (2012b)","key":"2_CR41"},{"doi-asserted-by":"crossref","unstructured":"Preschern, C., Kajtazovic, N., Kreiner, C.: Applying and evaluating architectural IEC 61508 safety patterns. In: 5th International Conference on Software Technology and Engineering (ICSTE) (2013a)","key":"2_CR42","DOI":"10.7763\/LNSE.2014.V2.84"},{"doi-asserted-by":"crossref","unstructured":"Preschern, C., Kajtazovic, N., Kreiner, C.: Building a safety architecture pattern system. In: 18th European Conference on Pattern Languages of Programs (EuroPLoP) (2013b)","key":"2_CR43","DOI":"10.1145\/2739011.2739028"},{"unstructured":"Preschern, C., Kajtazovic, N., Kreiner, C.: Catalog of safety tactics in the light of the IEC 61508 safety lifecycle. In: VikingPLoP (2013c)","key":"2_CR44"},{"unstructured":"Preschern, C., Kajtazovic, N., Kreiner, C.: Security analysis of safety patterns. In: 20th Conference on Pattern Languages of Programs (PLoP) (2013d)","key":"2_CR45"},{"key":"2_CR46","volume-title":"Software Fault Tolerance Techniques and Implementation","author":"L Pullum","year":"2001","unstructured":"Pullum, L.: Software Fault Tolerance Techniques and Implementation. Artech House, Norwood (2001)"},{"doi-asserted-by":"crossref","unstructured":"Rauham\u00e4ki, J., Kuikka, S.: Patterns for control system safety. In: 18th European Conference on Pattern Languages of Programs (VikingPLoP) (2013)","key":"2_CR47","DOI":"10.1145\/2739011.2739034"},{"unstructured":"Rauham\u00e4ki, J., Veps\u00e4l\u00e4inen, T., Kuikka, S.: Architectural patterns for functional safety. In: Nordic Conference on Pattern Languages of Programs (VikingPLoP) (2012)","key":"2_CR48"},{"unstructured":"Rauham\u00e4ki, J., Veps\u00e4l\u00e4inen, T., Kuikka, S.: Patterns for safety and control system cooperation. In: Nordic Conference on Pattern Languages of Programs (VikingPLoP) (2013)","key":"2_CR49"},{"doi-asserted-by":"crossref","unstructured":"Ryoo, J., Laplante, P., Kazman, R.: A methodology for mining security tactics from security patterns. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1\u20135. IEEE (2010)","key":"2_CR50","DOI":"10.1109\/HICSS.2010.18"},{"unstructured":"Saridakis, T.: A system of patterns for fault tolerance. In: EuroPLoP (2002)","key":"2_CR51"},{"issue":"1","key":"2_CR52","first-page":"125","volume":"3","author":"UVR Sarma","year":"2013","unstructured":"Sarma, U.V.R., Rampelli, S., Premchand, P.: A catalog of architectural design patterns for safety-critical real-time systems. Int. J. Eng. Res. Appl. 3(1), 125\u2013131 (2013)","journal-title":"Int. J. Eng. Res. Appl."},{"doi-asserted-by":"crossref","unstructured":"Schaad, A., Borozdin, M.: TAM2: automated threat analysis. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1103\u20131108. ACM (2012)","key":"2_CR53","DOI":"10.1145\/2245276.2231950"},{"doi-asserted-by":"crossref","unstructured":"Schaad, A., Garaga, A.: Automating architectural security analysis. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 131\u2013132. ACM (2012)","key":"2_CR54","DOI":"10.1145\/2295136.2295162"},{"key":"2_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b11930","volume-title":"Security Engineering with Patterns","author":"M Schumacher","year":"2003","unstructured":"Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/b11930"},{"key":"2_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2312-5","volume-title":"GSN\u2014The Goal Structuring Notation: A Structured Approach to Presenting Arguments","author":"J Spriggs","year":"2012","unstructured":"Spriggs, J.: GSN\u2014The Goal Structuring Notation: A Structured Approach to Presenting Arguments. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2312-5"},{"unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: Workshop on Dependable Embedded and Cyberphysical Systems - Held at the 32nd International Conference on Computer Safety, Reliability and Security (2013). https:\/\/hal.archives-ouvertes.fr\/file\/index\/docid\/848604\/filename\/7_-_main.pdf","key":"2_CR57"},{"unstructured":"Ugljesa, E., Wacker, H.: Modeling security aspects in safety environment. In: 7th International Conference on Electrical and Electronics Engineering, pp. 46\u201350 (2011)","key":"2_CR58"},{"unstructured":"Wu, W.: Safety tactics for software architecture design. MA thesis. The University of York (2003)","key":"2_CR59"},{"doi-asserted-by":"crossref","unstructured":"Wu, W.: Architectural reasoning for safety-critical software applications. Ph.D. thesis. University of York (2007)","key":"2_CR60","DOI":"10.1007\/978-3-540-74035-3_17"},{"doi-asserted-by":"crossref","unstructured":"Yampolskiy, M., et al.: Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach. In: 5th International Symposium on Resilient Control Systems, pp. 55\u201362. IEEE, August 2012","key":"2_CR61","DOI":"10.1109\/ISRCS.2012.6309293"},{"unstructured":"Yautsiukhin, A., Scandariato, R.: Towards a quantitative assessment of security in software architectures. In: 13th Nordic Workshop on Secure IT Systems (NordSec) (2008)","key":"2_CR62"}],"container-title":["Lecture Notes in Computer Science","Transactions on Pattern Languages of Programming IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14291-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T21:16:10Z","timestamp":1694639770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14291-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030142902","9783030142919"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14291-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}