{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:25:37Z","timestamp":1759134337506,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3344948.3344994","type":"proceedings-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T12:16:25Z","timestamp":1567685785000},"page":"109-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Mitigating security threats through the use of security tactics to design secure cyber-physical systems (CPS)"],"prefix":"10.1145","author":[{"given":"Cristian","family":"Orellana","sequence":"first","affiliation":[{"name":"Universidad T\u00e9cnica Federico Santa Maria, Valpara\u00edso, Chile"}]},{"given":"M\u00f3nica M.","family":"Villegas","sequence":"additional","affiliation":[{"name":"Universidad T\u00e9cnica Federico Santa Maria, Valpara\u00edso, Chile"}]},{"given":"Hern\u00e1n","family":"Astudillo","sequence":"additional","affiliation":[{"name":"Universidad T\u00e9cnica Federico Santa Maria, Valpara\u00edso, Chile"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Trevor A. Kletz. 2018. Hazop and Hazan: Identifying and assessing process industry hazards.  Trevor A. Kletz. 2018. Hazop and Hazan: Identifying and assessing process industry hazards .","DOI":"10.1201\/9780203752227"},{"key":"e_1_3_2_1_2_1","unstructured":"Mohamed Abomhara Geir K\u00f8ien and Martin Gerdes. 2015. A STRIDE-Based Threat Model for Telehealth Systems.  Mohamed Abomhara Geir K\u00f8ien and Martin Gerdes. 2015. A STRIDE-Based Threat Model for Telehealth Systems."},{"volume-title":"Software Architecture in Practice","author":"Bass Len","key":"e_1_3_2_1_3_1","unstructured":"Len Bass , Paul Clements , and Rick Kazman . 2012. Software Architecture in Practice ( third ed.). Addison-Wesley Professional . Len Bass, Paul Clements, and Rick Kazman. 2012. Software Architecture in Practice (third ed.). Addison-Wesley Professional."},{"key":"e_1_3_2_1_4_1","volume-title":"Designing Software Architectures: A Practical Approach","author":"Cervantes Humberto","unstructured":"Humberto Cervantes and Rick Kazman . 2016. Designing Software Architectures: A Practical Approach ( 1 st ed.). Addison-Wesley Professional . Humberto Cervantes and Rick Kazman. 2016. Designing Software Architectures: A Practical Approach (1st ed.). Addison-Wesley Professional.","edition":"1"},{"volume-title":"2015 10th Computing Colombian Conference (10CCC). 124--132","author":"Chavarriaga J.","key":"e_1_3_2_1_5_1","unstructured":"J. Chavarriaga , C. Noguera , R. Casallas , and V. Jonckers . 2015. Managing tradeoffs among architectural tactics using feature models and feature-solution graphs . In 2015 10th Computing Colombian Conference (10CCC). 124--132 . J. Chavarriaga, C. Noguera, R. Casallas, and V. Jonckers. 2015. Managing tradeoffs among architectural tactics using feature models and feature-solution graphs. In 2015 10th Computing Colombian Conference (10CCC). 124--132."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02463-4_19"},{"volume-title":"Agile Estimating and Planning","author":"Cohn Mike","key":"e_1_3_2_1_7_1","unstructured":"Mike Cohn . 2005. Agile Estimating and Planning . Prentice Hall PTR , Upper Saddle River, NJ, USA. Mike Cohn. 2005. Agile Estimating and Planning. Prentice Hall PTR, Upper Saddle River, NJ, USA."},{"volume-title":"Revisiting Architectural Tactics for Security","author":"Fernandez Eduardo B.","key":"e_1_3_2_1_8_1","unstructured":"Eduardo B. Fernandez , Hern\u00e1n Astudillo , and Gilberto Pedraza-Garc\u00eda . 2015. Revisiting Architectural Tactics for Security . In Software Architecture, Danny Weyns, Raffaela Mirandola, and Ivica Crnkovic (Eds.). Springer International Publishing , Cham , 55--69. Eduardo B. Fernandez, Hern\u00e1n Astudillo, and Gilberto Pedraza-Garc\u00eda. 2015. Revisiting Architectural Tactics for Security. In Software Architecture, Danny Weyns, Raffaela Mirandola, and Ivica Crnkovic (Eds.). Springer International Publishing, Cham, 55--69."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Solms Fritz and Loek Cleophas. 2015. A Systematic Method for Software Architecture Design.  Solms Fritz and Loek Cleophas. 2015. A Systematic Method for Software Architecture Design.","DOI":"10.5220\/0005383302150222"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.04.067"},{"volume-title":"The Security Development Lifecycle","author":"Howard Michael","key":"e_1_3_2_1_11_1","unstructured":"Michael Howard and Steve Lipner . 2006. The Security Development Lifecycle . Microsoft Press , Redmond, WA, USA . Michael Howard and Steve Lipner. 2006. The Security Development Lifecycle. Microsoft Press, Redmond, WA, USA."},{"volume-title":"A Quantitative Evaluation of the Impact of Architectural Patterns on Quality Requirements","author":"Kassab Mohamad","key":"e_1_3_2_1_12_1","unstructured":"Mohamad Kassab , Ghizlane El-Boussaidi , and Hafedh Mili . 2012. A Quantitative Evaluation of the Impact of Architectural Patterns on Quality Requirements . Springer Berlin Heidelberg, Berlin , Heidelberg , 173--184. Mohamad Kassab, Ghizlane El-Boussaidi, and Hafedh Mili. 2012. A Quantitative Evaluation of the Impact of Architectural Patterns on Quality Requirements. Springer Berlin Heidelberg, Berlin, Heidelberg, 173--184."},{"volume-title":"Proceedings. Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193)","author":"Kazman R.","key":"e_1_3_2_1_13_1","unstructured":"R. Kazman , M. Klein , M. Barbacci , T. Longstaff , H. Lipson , and J. Carriere . 1998. The architecture tradeoff analysis method . In Proceedings. Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193) . 68--78. R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere. 1998. The architecture tradeoff analysis method. In Proceedings. Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193). 68--78."},{"key":"e_1_3_2_1_14_1","volume-title":"STRIDE-based Threat Modeling for Cyber-Physical Systems. In 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe): Proceedings. IEEE.","author":"Khan Rafiullah","year":"2018","unstructured":"Rafiullah Khan , Kieran McLaughlin , David Laverty , and Sakir Sezer . 2018 . STRIDE-based Threat Modeling for Cyber-Physical Systems. In 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe): Proceedings. IEEE. Rafiullah Khan, Kieran McLaughlin, David Laverty, and Sakir Sezer. 2018. STRIDE-based Threat Modeling for Cyber-Physical Systems. In 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe): Proceedings. IEEE."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.18"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_17_1","volume-title":"Introduction to Embedded Systems: A Cyber-Physical Systems Approach","author":"Lee Edward Ashford","unstructured":"Edward Ashford Lee and Sanjit Arunkumar Seshia . 2016. Introduction to Embedded Systems: A Cyber-Physical Systems Approach ( 2 nd ed.). The MIT Press . Edward Ashford Lee and Sanjit Arunkumar Seshia. 2016. Introduction to Embedded Systems: A Cyber-Physical Systems Approach (2nd ed.). The MIT Press.","edition":"2"},{"key":"e_1_3_2_1_18_1","volume-title":"Cyber-Physical Attacks: A Growing Invisible Threat","author":"Loukas George","unstructured":"George Loukas . 2015. Cyber-Physical Attacks: A Growing Invisible Threat ( 1 st ed.). Butterworth-Heinemann , Newton, MA, USA . George Loukas. 2015. Cyber-Physical Attacks: A Growing Invisible Threat (1st ed.). Butterworth-Heinemann, Newton, MA, USA.","edition":"1"},{"volume-title":"Automation Test in Europe Conference Exhibition (DATE). 621--624","author":"Macher G.","key":"e_1_3_2_1_19_1","unstructured":"G. Macher , H. Sporer , R. Berlach , E. Armengaud , and C. Kreiner . 2015. SAHARA: A security-aware hazard and risk analysis method. In 2015 Design , Automation Test in Europe Conference Exhibition (DATE). 621--624 . G. Macher, H. Sporer, R. Berlach, E. Armengaud, and C. Kreiner. 2015. SAHARA: A security-aware hazard and risk analysis method. In 2015 Design, Automation Test in Europe Conference Exhibition (DATE). 621--624."},{"key":"e_1_3_2_1_20_1","volume-title":"Managing Trade-offs in Adaptable Software Architectures","author":"Mistrik Ivan","unstructured":"Ivan Mistrik , Nour Ali , Rick Kazman , John Grundy , and Bradley Schmerl . 2016. Managing Trade-offs in Adaptable Software Architectures ( 1 st ed.). Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA. Ivan Mistrik, Nour Ali, Rick Kazman, John Grundy, and Bradley Schmerl. 2016. Managing Trade-offs in Adaptable Software Architectures (1st ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.","edition":"1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241403.3241459"},{"volume-title":"2014 IEEE Colombian Conference on Communications and Computing (COLCOM). 1--8.","author":"Pedraza-Garcia G.","key":"e_1_3_2_1_22_1","unstructured":"G. Pedraza-Garcia , H. Astudillo , and D. Correal . 2014. A methodological approach to apply security tactics in software architecture design . In 2014 IEEE Colombian Conference on Communications and Computing (COLCOM). 1--8. G. Pedraza-Garcia, H. Astudillo, and D. Correal. 2014. A methodological approach to apply security tactics in software architecture design. In 2014 IEEE Colombian Conference on Communications and Computing (COLCOM). 1--8."},{"volume-title":"2017 IEEE International Conference on Software Architecture Workshops (ICSAW). 220--223","author":"Santos J. C. S.","key":"e_1_3_2_1_23_1","unstructured":"J. C. S. Santos , K. Tarrit , and M. Mirakhorli . 2017. A Catalog of Security Architecture Weaknesses . In 2017 IEEE International Conference on Software Architecture Workshops (ICSAW). 220--223 . J. C. S. Santos, K. Tarrit, and M. Mirakhorli. 2017. A Catalog of Security Architecture Weaknesses. In 2017 IEEE International Conference on Software Architecture Workshops (ICSAW). 220--223."},{"key":"e_1_3_2_1_24_1","volume-title":"A Security Analysis of Cyber-Physical Systems Architecture for Healthcare. Computers 5 (10","author":"Seifert Darren","year":"2016","unstructured":"Darren Seifert and Hassan Reza . 2016. A Security Analysis of Cyber-Physical Systems Architecture for Healthcare. Computers 5 (10 2016 ), 24. Darren Seifert and Hassan Reza. 2016. A Security Analysis of Cyber-Physical Systems Architecture for Healthcare. Computers 5 (10 2016), 24."},{"key":"e_1_3_2_1_25_1","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack . 2014 . Threat Modeling: Designing for Security ( 1 st ed.). Wiley Publishing . Adam Shostack. 2014. Threat Modeling: Designing for Security (1st ed.). Wiley Publishing.","edition":"1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4"},{"volume-title":"Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications","author":"Song Houbing","key":"e_1_3_2_1_27_1","unstructured":"Houbing Song , Glenn A. Fink , and Sabina Jeschke . 2017. Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications . Wiley . Houbing Song, Glenn A. Fink, and Sabina Jeschke. 2017. Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications. Wiley."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556938"}],"event":{"name":"ECSA: European Conference on Software Architecture","acronym":"ECSA","location":"Paris France"},"container-title":["Proceedings of the 13th European Conference on Software Architecture - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344948.3344994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":28,"alternative-id":["10.1145\/3344948.3344994","10.1145\/3344948"],"URL":"https:\/\/doi.org\/10.1145\/3344948.3344994","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}