improve the qualitative analysis phase to be able to
generate more complete Attack trees. Besides, many
other methods can still be added to our process.
ACKNOWLEDGEMENTS
The work in this paper is funded by SesamGrids
project (The consortium Sesam-Grids, 2012) and
Risc project (The consortium RISC, 2013).
We want to thank the Phd student Anas Motii for
his important participation to a part of this work.
REFERENCES
Bernardi, S., Merseguer, J., & Petriu, D. C. (2013). Model-
Driven Dependability Assessment of Software
Systems. Springer.
Bran, S., Gérard, S. (2014): Modeling and Analysis of
Real-Time and Embedded Systems with UML and
MARTE. Elsevier.
Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk
management guide for information technology
systems. Nist special publication, 800(30), 800-30.
Alberts, C., Dorofee, A., Stevens, J., & Woody, C. (2003).
Introduction to the OCTAVE Approach. Pittsburgh,
PA, Carnegie Mellon University.
Secrétariat Général de la Défense Nationale (2004).
EBIOS- Expression des Besoins et Identification des
Objectifs de Sécurité.
Gérard, S., Dumoulin, C., Tessier, P., & Selic, B. (2011).
19 Papyrus: A UML2 tool for domain-specific
language modeling. In Model-Based Engineering of
Embedded Real-Time Systems (pp. 361-368). Springer
Berlin Heidelberg.
Mcdonald, J., Decroix, H., Caire, R., Sanchez, J., Chollet,
S., Oualha, N., Puccetti, A., Hecker, A., Chaudet, C.,
Piat, H., others (2013): The SINARI project: security
analysis and risk assessment applied to the electrical
distribution network.
Basin, D., Clavel, M., & Egea, M. (2011, June). A decade
of model-driven security. In Proceedings of the 16th
ACM symposium on Access control models and
technologies (pp. 1-10). ACM.
Panesar-Walawege, R. K., Sabetzadeh, M., & Briand, L.
(2013). Supporting the verification of compliance to
safety standards via model-driven engineering:
Approach, tool-support and empirical validation.
Information and Software Technology, 55(5), 836-864.
OMG, U. (2003). Profile for modeling quality of service
and fault tolerance characteristics and mechanisms.
Revised submission, Object Management Group.
den Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., &
Vraalsen, F. (2007). Model-based security analysis in
seven steps—a guided tour to the CORAS method. BT
Technology Journal, 25(1), 101-117.
Behnia, A., Rashid, R. A., & Chaudhry, J. A. (2012). A
Survey of Information Security Risk Analysis
Methods. Smart CR, 2(1), 79-94.
Gudemann, M., & Ortmeier, F. (2011, June). Towards
model-driven safety analysis. In Dependable Control
of Discrete Systems (DCDS), 2011 3rd International
Workshop on (pp. 53-58). IEEE.
Schneier, B. (1999). Attack trees: Modeling security
threats. Dr. Dobb’s Journal, vol. 12, no 24, p. 21–29.
International Security Technology (IST), (2002). A brief
history of CORA.
http://www.ist-usa.com Accessed 16-6-2013.
Karabacaka B, Songukpinar I., (2005), ISRAM:
Information security risk analysis method, Computer
& Security, March, pp. 147-169.
Ten, C. W., Liu, C. C., & Manimaran, G. (2008).
Vulnerability assessment of cybersecurity for SCADA
systems. Power Systems, IEEE Transactions on,23(4),
1836-1846.
Saini, V., Duan, Q. & Paruchuri, V., (2008). Threat
modeling using Attack trees. J. Comput. Small Coll.,
23(4), 124-131.
Ministerio de Administraciones Publicas (2006). Magerit -
version 2 - Methodology for Information Systems Risk
Analysis and Management - Book I - The Method,
Madrid, 20 June.
Dhouib, S., Kchir, S., Stinckwich, S., Ziadi, T., & Ziane,
M. (2012). Robotml, a domain-specific language to
design, simulate and deploy robotic applications. In
Simulation, Modeling, and Programming for
Autonomous Robots (pp. 149-160). Springer Berlin
Heidelberg.
Yakymets, N., Dhouib, S., Jaber, H., Lanusse, A. (2013).
Model-driven safety assessment of robotic systems. In:
Intelligent Robots and Systems (IROS), 2013
IEEE/RSJ International Conference on, pp.1137-1142.
Secrétariat Général de la Défense Nationale (2010).
EBIOS- Expression des Besoins et Identification des
Objectifs de Sécurité, Méthode de Gestion des risques.
http://www.ssi.gouv.fr/IMG/pdf/EBIOS-1-
GuideMethodologique-2010-01-25.pdf.
The consortium Sesam-Grids (2012), The Sesam-Grids
Project, In http://www.sesam-grids.org/.
The consortium RISC (2013), The RISC Project,
http://risc.sec4scada.com/
National Institute of Standards and Technology (2014).
Systems Security Engineering, An Integral Approach
to Building Trustworthy Resilient Systems. NIST
Special Publication 800-160.
TowardsaModel-drivenbasedSecurityFramework
645