<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main"></title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Mokhor</surname></persName>
							<email>v.mokhor@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">G. E. Pukhov Institute for Modeling in Energy Engineering</orgName>
								<orgName type="department" key="dep2">National Academy of Sciences of Ukraine</orgName>
								<address>
									<addrLine>15, General Naumov Str</addrLine>
									<postCode>03164</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Bakalynskyi</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">G. E. Pukhov Institute for Modeling in Energy Engineering</orgName>
								<orgName type="department" key="dep2">National Academy of Sciences of Ukraine</orgName>
								<address>
									<addrLine>15, General Naumov Str</addrLine>
									<postCode>03164</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Iaroslav</forename><surname>Dorohyi</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Donetsk National Technical University</orgName>
								<address>
									<addrLine>56, Potebni Str</addrLine>
									<postCode>43003</postCode>
									<settlement>Lutsk</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>37, Prospect Beresteiskyi</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vasyl</forename><surname>Tsurkan</surname></persName>
							<email>v.v.tsurkan@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">G. E. Pukhov Institute for Modeling in Energy Engineering</orgName>
								<orgName type="department" key="dep2">National Academy of Sciences of Ukraine</orgName>
								<address>
									<addrLine>15, General Naumov Str</addrLine>
									<postCode>03164</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>37, Prospect Beresteiskyi</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">Information Technologies and Security</orgName>
								<address>
									<addrLine>November 30</addrLine>
									<postCode>2023</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">8BB51B4F765A006C7B650E33B8036AB7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Risk assessment, risk treatment, information security management system architecture, model-based systems engineering, model-based architecture, interested party.1 0000-0001-5419-9332 (V. Mokhor)</term>
					<term>0000-0001-9712-2036 (O. Bakalynskyi)</term>
					<term>0000-0003-3848-9852 (Ia. Dorohyi)</term>
					<term>0000-0003-1352-042X (V. Tsurkan)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The representation of the architecture of an information security management system has been investigated. The peculiarities of how the organization, as an environment, influences its key concepts and properties have been demonstrated. This influence is reflected in the elements of connections, principles, and the evolution of the information security management system. Describing its architecture within a specific organization-considering the type, size, and nature of the organization-has been reduced to constructing a model from the perspective of stakeholders. To achieve this, it is proposed to use systems engineering based on a model, preceded by an analysis of its features and advantages. Secure system development patterns and extensions of the Unified Modeling Language, including UMLsec and SysML, have been discussed. Among these, SysML has been highlighted, and its practical application has been analyzed. Additionally, relational probabilistic models have been researched as alternatives. Further stereotypes of the SysML language have been identified. Moreover, a method for presenting and justifying the design of information security management systems, referred to as REISMSAD, has been proposed. Its use is oriented toward developing and documenting architectural decisions, as well as justifying the project's development within the organization. This approach has enabled the formulation of tasks for verifying the architectural decisions of information security management systems. As a result, it has become possible to apply formal methods based on labeled transition systems to solve these tasks. Consequently, achieving a unified representation of the architecture model of the information security management system has become feasible, primarily from the perspectives of various stakeholders. The language for modeling systems serves as the basis for such formalization. According to its graphical notation, an architecture element is represented as a block, along with its properties and the relationships between them.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The embodiment of the main concepts and properties of a system within its environment is reflected in its elements, connections, principles, and evolution <ref type="bibr" target="#b0">[1]</ref>. Such reflection is conventionally represented by its architecture. The description of its creation within a specific environment and/or community of stakeholders is determined by a model constructed from a particular perspective <ref type="bibr" target="#b1">[2]</ref>.</p><p>A characteristic feature of creating information security management systems is the focus on ensuring the integrity of fundamental information properties within an organization. This is achieved through risk assessment, which guarantees stakeholders proper handling of these risks <ref type="bibr" target="#b2">[3]</ref>. In this context, the organization is interpreted as the surrounding environment that defines the parameters and conditions influencing the information security management system. Meanwhile, its main concepts and properties are embodied in the elements and connections of the architecture <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>With this interpretation, it becomes possible to establish probable influences on the information security management system from the organization's perspective, taking into account its type, size, and nature <ref type="bibr" target="#b3">[4]</ref>. Additionally, the model considers the existence and interaction with other management systems, such as cybersecurity and private information security. This is crucial for addressing the needs, expectations, and limitations of stakeholders within defined boundaries (organization and organizational units). Therefore, a model-based representation of the architecture of information security management systems is highly relevant.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Engineering systems with security in mind has several advantages. Systems with added security are evidently less prone to failures and breaches caused by malicious actors. The international standard ISO/IEC 21827 <ref type="bibr" target="#b4">[5]</ref> defines additional advantages for engineering organizations that prioritize security, such as "savings from the absence of rework due to repeatability, predictable processes, and practices; recognition of the true capability to perform tasks, especially in selecting sources; and an emphasis on measured organizational competence (maturity) and improvement."</p><p>Considering the advantages in reliability and cost, there is a significant body of work in the field of security-focused systems engineering and software engineering. Several international standards relate to secure software/system engineering. As mentioned, ISO/IEC 21827 pertains to this field, providing motivation for security requirements in systems and defining ways to assess an organization's procedures for developing such systems. However, its primary focus lies in determining an organization's maturity regarding established processes, such as ensuring information security and cybersecurity. This standard is complemented by guidelines <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref> that offer clear instructions on forming continuous and cohesive information security policies throughout the organization. Key components are formally defined, namely: confidentiality, integrity, availability, non-repudiation, and authenticity.</p><p>The Carnegie Mellon Software Engineering Institute published several "Secure Design Patterns" through its CERT program <ref type="bibr" target="#b7">[8]</ref>. Designed for maximum reusability in various design scenarios, these high-level patterns provide strategies for use in system architecture, modular design, and implementation, all with a security orientation. Each pattern is inspired by a specific vulnerability, such as privilege escalation (a common method for executing malicious code or accessing resources without proper permission) or input validation flaws (a common method for injecting SQL commands through an interface to a database). Each pattern consists of predefined elements that define the circumstances under which the design pattern can be used, including entities and code snippets for application.</p><p>By analyzing information flow and system usage, it is possible to identify functionalities and interactions that correspond to anticipated design patterns and create solutions that help avoid common issues. With a plethora of standards and guidelines focused on secure architectures and design patterns that promote secure development, it is evident that security is a multifaceted, systemic issue. UMLsec is an extension of UML aimed solely at software development. This solution attempts to incorporate security into UML during the development stage <ref type="bibr" target="#b8">[9]</ref>. In relevant works, Jürjens provides a comprehensive analysis of several standard UML diagrams that can supplement the security analysis of software systems <ref type="bibr" target="#b9">[10]</ref>. Regarding the physical elements of a system, he relies on the deployment diagram to view the physical connections between devices.</p><p>While UMLsec is a useful step toward building secure system architectures, it is more beneficial to consider a systems view, supported by SysML. AVATAR is an environment based on SysML, developed within the European project EVITA, a consortium of security, academic, and automotive industry partners researching secure networks on automotive platforms <ref type="bibr" target="#b10">[11]</ref>. AVATAR extends SysML through several stereotypes and security-based functions, including the use of temporary functions in standard state diagrams, allowing for the modeling of delays between states and minimal processing time <ref type="bibr" target="#b11">[12]</ref>. Other extensions are designed for using traditional cryptographic algorithms as part of the model. A formal proof language is then employed to verify that the security requirements of the system are met. While this represents an important advancement, the techniques proposed by the authors primarily focus on the cryptographic aspects of information security, with less detailed exploration of system aspects such as architectural vulnerabilities and access control. The central emphasis on encryption makes it unrealistic to detect vulnerabilities beyond confidentiality breaches using AVATAR in its current form.</p><p>Additional attempts to explicitly model security systems within SysML and UML are proposed, as seen in <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>. Most of these approaches modify existing diagrams to allow for an explicit description of security requirements; however, they offer little in terms of automatically extracting relevant information from an existing model to identify security vulnerabilities.</p><p>An alternative to building on UML or SysML models is the use of Probabilistic Relational Models (PRMs). PRMs are similar to class diagrams in UML but utilize probabilistic attributes (both quantitative and qualitative) to represent the probabilistic characteristics of classes and the relationships between attributes. In <ref type="bibr" target="#b14">[15]</ref>, a PRM-based language for modeling architectures at the organizational level is proposed (CySeMoL). The probabilistic inference mechanism generates attack probabilities (i.e., the probability that an attack will be executed and successfully completed) based on data from previous attacks. The advantage of this technique is that system architects can reuse components and inherit previously stored attack vector data. Additionally, all known types of attacks, including denial of service, are captured, providing a comprehensive overview of the attack landscape.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">SysML extension for modeling security systems</head><p>SysML is a powerful modeling language that can provide significant benefits for developers concerned with security. First and foremost, SysML offers a standardized way for system engineers and security experts to view systems of interest, helping to bridge the gap between these disciplines.</p><p>Models are typically created as part of the system lifecycle or, in the case of deployed systems, constructed retroactively for documentation purposes. Therefore, using models as part of the security assurance process aligns well with the typical use of SysML, resulting in minimal additional modeling overhead.</p><p>Since models are often regarded as "living documents" that are maintained to reflect design architecture choices and modifications, they serve as valuable sources of information for information security professionals who require an accurate, up-to-date representation of the system for its proper protection.</p><p>As previously discussed, SysML, in its original form, includes many built-in provisions for stakeholders involved in security assurance. However, the idea of adding new features to extensible modeling languages to better address security concerns is not without precedent, and SysML supports such capabilities. For systems engineers, security is a primary objective when reviewing model data. By applying the paradigm of separating concerns, systems engineers can specifically address security issues as a key part of the system lifecycle, including information security management systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Developing a Threat Model</head><p>To determine what information is valuable from a security standpoint, it is essential to represent concepts that are significant within the context of SysML. Figure <ref type="figure" target="#fig_0">1</ref> illustrates the relationship between threat and risk <ref type="bibr" target="#b4">[5]</ref>.</p><p>This model provides a high-level description of risks related to information security. It defines how threats exploit vulnerabilities in information assets. Countermeasures specific to these vulnerabilities help minimize the risk to information assets. These relationships aid in identifying the connections between threats, vulnerabilities, countermeasures, risk, and information assets. Furthermore, SysML's holistic view of the system allows for the expansion of these relationships to encompass a broader range of concepts. Figure <ref type="figure" target="#fig_1">2</ref> presents a more comprehensive threat model, intended to serve as the foundation for the security view within SysML.    <ref type="figure" target="#fig_1">2</ref> presents a series of interconnected stereotypes that can be applied to blocks when modeling information security management systems. In addition to the concepts presented in Figure <ref type="figure" target="#fig_0">1</ref>, the SysML Threat Agent Profile describes how threats result from threat agents and reveals the information assets that are vulnerable due to the exploitation of vulnerabilities by known threats.</p><p>Threat agents can be either human or computational devices (such as tablets or laptops) infected with malicious software and capable of transmitting additional malicious payloads. Human threats refer to actions (such as inserting a USB drive into a computer or deliberately disabling security systems), while computational threats are modeled as actions that spread malicious software packages or initiate more general threats (such as sending malicious commands). Computational devices serve as both sources of threats and information assets that need to be protected due to the potential for cascading attacks with multiple malicious payloads.</p><p>The model also illustrates how countermeasures are defined based on risk assessments of specific threat agents, thereby closing the loop from threat agent to countermeasure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Developing a Data Model Profile</head><p>Although the threat agent profile provides information on how threats interact with information assets and vulnerable elements, it lacks a model of the interaction between assets and data. Without considering data relationships from an information security perspective, the model remains incomplete. Figure <ref type="figure" target="#fig_3">3</ref> presents a graphical representation of the data model, illustrating the relationships between information assets, data storage devices, and communication protocols. In its current state, the information in the data model regarding communication protocols is limited, as it does not capture the layered nature of these protocols. In this work, the "Communication Path" stereotype should be considered a model of the physical connections between devices, or, in the case of wireless networks, an acknowledgment that data can circulate between connected assets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Extension of the modeling tool</head><p>With the corresponding profiles contained in the system, the following stereotypes can be applied to elements with existing models:</p><p>1. Asset: defines any resource that can be the target of an attack. The "criticality" representation of the asset is maintained so that different information assets can be prioritized by importance within the information security management system. 2. Communication Path: this stereotype can be applied to any relationship between model elements and any block representing a communication protocol, such as TCP/IP. It provides the ability to represent all communication paths, whether encrypted or not, and assess their criticality to the information security management system. 3. Data Storage: data storage devices are information assets and data processors, so they can indicate whether data is stored, encrypted, and what its criticality is. 4. Vulnerability: applied to classes. These classes capture the URLs of known vulnerability reports and allow them to be associated with specific vulnerable elements (information assets). 5. Vulnerable Item: the vulnerable item is stored in the threat model as a type of information asset. It should have a countermeasure that protects it and is associated with the vulnerability class.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">View on Information Security</head><p>Adding threat and data models to SysML allows for the inclusion of new information in the model and creates a security view-specifically, a collection of visual representations of the system that displays this new information. The security view should address the key security issues as defined in <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.1.">Confidentiality</head><p>Confidentiality is defined as "the property that information is not made available or disclosed to unauthorized individuals, entities, or processes" <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. To consider confidentiality, it is essential to take into account how information is communicated. The "Communication Path" stereotype requires that all communication paths be marked as encrypted or not. It is important to note that by using a simple logical flag, a systems engineer can declare channels as encrypted, leaving the details about encryption techniques to be developed in a more detailed specification later. Currently, there is no formal representation of encrypted data in the model. Defining data as another type of information asset will allow it to be included in the threat model. However, this approach will not apply the "isEncrypted" flag, as it is a concept that does not apply to all types of assets <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.2.">Integrity</head><p>Integrity is defined as "the property of ensuring the accuracy and completeness of information assets" <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. Using SysML adds additional meaning to "integrity," as a security view will not benefit from continuous security monitoring if the model's integrity is compromised. Implementing checksums for software and data allows for periodic automated checks to ensure that the current configuration has maintained its integrity. Recording checksums for software and data in the toolchain is feasible since updates are typically less frequent than those in standard IT systems and should always be executed under a controlled deployment strategy. Such a strategy should include updates to the system models to reflect changes <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.3.">Availability</head><p>Availability is defined as "the property of being accessible and usable upon demand by an authorized entity" <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref>. In the least harmful case, attacks compromising the availability of information assets may deprive users of access to remote services or processes, incurring significant financial costs. In the worst-case scenario, a service whose access is denied could involve an internal control mechanism that, if denied for a sufficiently prolonged period, might lose control over a critical system or service. Therefore, it is important not only to check interfaces for potential denial-of-service sources affecting users but also to work backward from critical information assets to identify connections with threats that could "flood" the controller with messages, ensuring the implementation of sensitive message processing procedures. Most of the information necessary for evaluation is included in the original SysML diagram. However, additional stereotyped delineation of ports on vulnerable elements allows querying the tool to identify all ports not associated with mitigation actions against threats. In <ref type="bibr" target="#b15">[16]</ref>, the availability of management systems used in the energy sector is investigated through interviews with enterprise employees. The systems considered have SCADA components, disconnection management, and distribution management. The study showed that many disconnections were related to software issues on both primary and backup systems, as well as the underutilization of hardware redundancy specifically for such cases. This has implications for security; if failover recovery techniques are not applied (where the backup system has a completely different design from the primary), vulnerabilities found in the software of one system will also exist in the other.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.4.">Non-repudiation</head><p>Non-repudiation is defined as "the ability to prove that an action or event occurred, so that this event or action cannot be repudiated later" <ref type="bibr" target="#b4">[5]</ref>. Indeed, actors in the information security management system can trigger events by sending explicit commands or by reporting on variables associated with predicted triggers. To ensure non-repudiation, an important factor is accurate data logging, which indicates who executed a command and when. This underscores the significance of data integrity, as malicious actors might attempt to deliberately edit logs to compromise the system's non-repudiation. Additionally, data recorded in logs is of little value if the source of the command is unidentified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.5.">Authenticity</head><p>Authenticity is defined as "the property that ensures the identity of the information asset matches the claimed identity. Authenticity relates to entities such as users, processes, systems, and information" <ref type="bibr" target="#b4">[5]</ref>. Authenticity is characterized by two types of interactions: direct (through device authentication) and indirect (through the role of authentication in the authorization process).</p><p>Authentication is an extremely complex issue because, for security-critical systems, the need for authentication can introduce an unacceptable delay between the detection of an event and the response to it. Moreover, actions related to emergency management (e.g., emergency shutdowns) often involve the same actions that a malicious user might want to exploit. Establishing a policy that relaxes security during emergencies is dangerous, as it creates an additional incentive for attackers to induce failures and may encourage legitimate users to perform potentially hazardous actions to bypass security measures. Additionally, encryption and authentication increase the bandwidth requirements of the communication flow, which is unacceptable for real-time management. After successful user authentication, one can proceed to a separate authorization process. People, as threat objects, should be associated with the access level they pose to the system, making risk assessment more realistic. However, it is challenging to identify other elements within the threat model that should be associated with security levels, as specific implementations of the authentication process go beyond the scope of the high-level models considered in this work. The "Asset" stereotype is not directly linked to security levels, as a single device may have multiple modes of functionality, each with its own access level. For example, parameterization typically has a higher security level than simple on/off commands.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Model-based information security management systems architecture</head><p>The precondition for defining the architecture of an information security management system is the analysis of the organization's activities as the surrounding environment. Based on established internal and external circumstances, requirements are formulated by stakeholders. Implementing these requirements allows for the consideration and, ultimately, the satisfaction of defined needs, expectations, and limitations. Consequently, transforming stakeholders' perspectives into a vision for a technical solution is essential. This transformation is crucial for presenting the characteristics, attributes, and both functional and non-functional requirements of the information security management system within the organization <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b3">4]</ref>.</p><p>Considering the interests of stakeholders and the established functional and non-functional requirements is achieved by creating alternative variants of information security management system architectures. Each architecture defines elements and relationships between them, as well as interfaces for interacting with other systems within the organization and with other organizations (or structural parts of the same organization). Additionally, systems for managing cyber and information security should consider their dependency on quality management systems, as these generally form an integrated organizational management system <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4]</ref>. Interfaces and interactions characterize the boundaries of the system's creation and implementation. These aspects are taken into account through the development of a model of the architecture of the information security management system. To address this task, the use of system engineering based on a model is proposed <ref type="bibr" target="#b16">[17]</ref>.</p><p>The proposed methodology allows for a shift away from a document-based approach to building a model of the architecture of the information security management system. This approach achieves uniformity in its representation, primarily from the perspectives of different stakeholders. Such uniformity is important for both a clear understanding and the effective meeting of their needs, expectations, and limitations. The foundation of this formalization is the SysML modeling language, extended with additional security stereotypes, as previously mentioned, and an additional set of stereotypes that describe the architecture of the security system according to <ref type="bibr" target="#b0">[1]</ref>, which will be presented below. In graphical notation, an element of the architecture of the information security management system is represented as a block, along with its properties and relationships to other elements. Furthermore, the structure of each block can be further detailed through its ports and interfaces. This capability is useful for depicting interactions both within the elements of the architecture of the information security management system and with the surrounding environment.</p><p>To transform the model views of the architecture according to the ISO 42010 standard <ref type="bibr" target="#b0">[1]</ref>, additional stereotypes of the SysML language should be created. The following stereotypes will be utilized:</p><p>1. Architecture Description: Provides a description of the architecture. Views" that is governed or formulated without using models. Taking these into account, the architecture of the information security management system can be represented by the following model in SysML graphical notation (Figure <ref type="figure" target="#fig_4">4</ref>). The method of representing the architecture of the Information Security Management System (ISMS) that we will discuss is called the Rationale and Evaluation of Information Security Management System Architecture Design (REISMSAD). REISMSAD aims to assist architects in creating and documenting architectural designs with a focus on architectural decisions and project justifications. It encompasses three types of architectural knowledge: design issues (represented by the "Stakeholder" element), design decisions (represented by the "Architecture Description" element), and project outcomes (represented by the "Architecture" element). These knowledge objects are represented by standard SysML objects.</p><p>The design issue refers to the set of materials that influence the designer's or project's decisions. This entity encapsulates concepts such as functional requirements (e.g., scenarios), non-functional requirements (e.g., all quality attributes), and project contexts. It also captures information about design decisions and project justifications. Project outcomes include the decisions made, such as classes, components, interfaces, and usage scenarios. Each individual type of architectural knowledge object is captured by applying a predefined tag template of the stereotype.</p><p>In essence, REISMSAD is represented as a directed acyclic graph that connects the architecture elements (CAE -"Architecture Element" elements) with the architecture rationale elements (AR -"Architecture Description" elements) using the directed relationship ARtr. AR encapsulates the "Architecture Description" result for the "Architecture." Since AR has a 1:1 relationship with the "Architecture," it serves as the decision point for justifying the architecture. The relationship between CAE and AR is represented by the directed association ARtr, which signifies a cause-and-effect relationship.</p><p>Definition 1. The REISMSAD Model is a labeled transitive system, where:  CAE is the set of nodes representing critical and non-critical elements of the architecture;  𝐶𝐴𝐸 is a subset of initial states of architecture elements;  AR is the set of nodes representing architecture rationale;  𝐴 is a finite set of action labels;  Σ is the set of system variables;  𝐿 is the labeling function 𝐿: 𝐶𝐴𝐸 → 2 for elements;  𝑅 is the set 𝑅 ⊆ (𝐶𝐴𝐸 × 𝐴𝑅) ∪ (𝐴𝑅 × 𝐶𝐴𝐸) of directed links between nodes, which satisfies the following conditions:</p><p>1. All nodes in AR must be associated with at least one cause and one effect, meaning there exists ∀𝑟 ∈ 𝐴𝑅 a cause 𝑒 ∈ 𝐶𝐴𝐸 such that (𝑒, 𝑟) ∈ 𝑅 and there is an effect 𝑒′ ∈ 𝐶𝐴𝐸, where (𝑟, 𝑒′) ∈ 𝑅.</p><p>2. There is no subset of R that forms a directed cycle. The primary form of the model construct is a path of the form {𝐶𝐴𝐸 , 𝐶𝐴𝐸 , … } → 𝐴𝑅 → {𝐶𝐴𝐸 , 𝐶𝐴𝐸 , … }, where 𝐶𝐴𝐸 , 𝐶𝐴𝐸 are inputs or causes of the decision 𝐴𝑅 and 𝐶𝐴𝐸 , 𝐶𝐴𝐸 are outputs or consequences of this decision. Figure <ref type="figure" target="#fig_5">5</ref> illustrates a diagram demonstrating this defined model construct. The multiplicity of relationships in the diagram shows that the motivational and resulting sets CAE are non-empty sets connected through a single element AR. The uniqueness constraint on the diagram specifies that each instance of CAE cannot be depicted more than once. Directed links ARtr represent cause-and-effect relationships. CAE leads to AR through the motivation or constraints of the "Architecture Description," which in turn generates CAE of type "Architecture" having "Architecture Description." CAE can function as both an input and an output when used for two decisions. As an input, it can represent artifacts of the following types: requirement, precedent, class, and implementation. As an output, it can be a new or revised design element.</p><p>In REISMSAD, architectural elements (CAE) are artifacts that form parts of the architecture design. They include needs that must be satisfied, technical and organizational constraints imposed on the architecture project, assumptions to be verified, and design objects that result from architectural design.</p><p>Architectural elements can also be classified from different architectural perspectives. This classification focuses on various aspects of the project solution. The following perspectives on architecture are used for classification: logic, data level, application, technologies, and security.</p><p>It is assumed that the architecture view includes requirements and environmental factors. Five categories of architectural views have been created, describing different aspects of influence on architectural design. System requirements include both functional and non-functional requirements. This classification allows the architect to trace the process of justifying decisions back to specific classes of root causes during analysis.</p><p>"Architecture" elements are the results of the design process and can be classified according to the following architectural perspectives:</p><p> Data-based -used by applications.  Application-based -processing logic and software structure, critical and non-critical services.  Technology-based -technologies and environments used for system implementation and deployment, critical and non-critical components.  Security-based -security profiles, risk management, critical and important components. The REISMSAD approach allows for three types of architectural justifications: quantitative, qualitative, and alternative architecture. Qualitative justification represents the justification process and arguments in textual form, essentially outlining the pros and cons of each project decision. Quantitative justification utilizes various criteria to evaluate project decisions. The third type involves documenting and storing discarded alternative project decisions, which can be reviewed to assess the sufficiency of existing evaluation parameters for current architectural projects and for future use in other projects.</p><p>It should be noted that architectural decisions can evolve over time due to changes in organizational processes and shifts in the environment itself. As these decisions evolve, the original architectural design and the description of the decision-making process for this project may be lost. Therefore, it is necessary to preserve the entire history of the project's evolution.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Verification of models based on LTS</head><p>Methods for model verification (MV) typically specify RS using temporal logic formulas <ref type="bibr" target="#b17">[18]</ref>. Temporal logic formulas describe the temporal properties of computations (sequences of transitions) of the model. The most commonly used logics in MV methods are Computational Tree Logic (CTL), Linear Time Logic (LTL), and a combination of both, CTL⋆. An overview of model verification methods is provided in <ref type="bibr" target="#b18">[19]</ref>.</p><p>The task of verifying models of architectural decisions in information security management systems can be formulated as follows:</p><p>Task 1. Given a model of architectural decision 𝑀 = 𝑃 || … ||𝑃 , where 𝑃 , … , 𝑃 is the LTS of the REISMSAD system. A formula (specification) 𝜑 in temporal logic with respect to the variables of model M is provided. It is necessary to check the validity of formula 𝜑 in model M (denoted as 𝑀 ⊨ 𝜑).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Task of verification of parameterized models of architectural decisions in information security management systems.</head><p>This work considers a generalization of the model verification problem. Verification methods are applied to architectural models of ISMS represented as SysML diagrams, consisting of a finite set of architectural elements and architectural descriptions specified as Labeled Transition Systems (LTS). Since the set of initial configurations is infinite, the set of architectural decision models with varying numbers of processes is also infinite. Verifying several randomly selected models from this set does not guarantee that the specifications will be fulfilled for all models in the set. For such systems, the task can be generally formulated as follows:</p><p>Task 2. Given an infinite family of finite models of architectural decisions in ISMS denoted as ℱ = {𝑀 }, parameterized by a parameter 𝑛 ∈ 𝑁. A formula (specification) 𝜑 of temporal logic is given. It is necessary to verify the validity of the formula 𝜑 on all models ℱ, that is 𝑀 ⊨ 𝜑, for all 𝑛. This task is called parameterized model verification (PMV).</p><p>The formulation of Task 2 requires clarification since the general formulation does not explicitly specify how to define the family ℱ and the specification 𝜑. Therefore, we will consider the following variant of Task 2.</p><p>Task 3. Given an infinite family of finite models of architectural decisions in ISMS denoted as ℱ = {𝑀 }, parameterized by a parameter 𝑛 ∈ 𝑁. Each model 𝑀 = 𝑄||𝑃 || … ||𝑃 consists of an LTS of a fixed model REISMSAD 𝑄 and 𝑛 instances of LTS of alternative models 𝑃 . 𝐼 ⊆ ℕ is a fixed finite set of indices of observed alternative models, instances of prototypes 𝑃. The specification 𝜑 of temporal logic is given relative to variables defined in the models 𝑃 , 𝑖 ∈ 𝐼 and variables of the model 𝑄. It is necessary to verify the validity of the formula 𝜑 on all models in the family ℱ, that is 𝑀 ⊨ 𝜑, for all 𝑛.</p><p>In fact, in the formulation of Task 3, only one fixed model 𝑄 and 𝑛 instances of prototypes 𝑃 are used. We can consider a variant of the task where there are several fixed models 𝑄 , … , 𝑄 and several alternative models 𝑃 , 𝑃 , … , 𝑃 , and a model 𝑀 = 𝑄 ‖… ‖𝑄 𝑃 ‖… ‖𝑃 … 𝑃 ‖… ‖𝑃 , where 𝑛 + ⋯ + 𝑛 = 𝑛 is the parameter. In some cases, this task can be reduced to the formulation of Task 3 by constructing the LTS of the model 𝑄 as a parallel composition of LTS of models 𝑄 , … , 𝑄 , and the LTS of the prototype 𝑃 as a parallel composition of LTS of prototypes 𝑃 , 𝑃 , … , 𝑃 .</p><p>The proposed formulation of the tasks in the form of ( <ref type="formula">1</ref>)-( <ref type="formula">3</ref>) enables the application of a wide range of formalized methods for verifying parameterized models specified as Labeled Transition Systems (LTS). In this work, one of the methods for searching invariants <ref type="bibr" target="#b18">[19]</ref> was employed for the verification of the constructed models during the implementation of a unified design system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The main concepts and properties of information security management systems in their environment are reflected by elements, connections, principles, and evolution. The environment can refer to the organization as a whole or to a specific structural part. Depending on its type, size, and nature, its influence is assessed. This representation within a specific environment is characterized by an architectural model of the information security management system, built from the perspective of stakeholders.</p><p>To achieve this, the advantages of using systems engineering with security considerations in organizations have been analyzed. Secure design patterns aimed at preventing vulnerabilities from being exploited by threats to the security of information assets have been discussed. Special attention has been paid to extending typical modeling languages, such as UMLsec. Among them, SysML has been highlighted, and the AVATAR environment based on it has been studied as an example. Additionally, the application of relational probabilistic models has been analyzed as an alternative to using UML and SysML.</p><p>The appropriateness of using the SysML modeling language as an extension of UML has been justified. In this context, the visualization of the relationship between threat and risk has been considered, leading to an extension with a detailed representation of threat agents. The interaction between information assets and data has also been included, expanding the list of stereotypes (e.g., data repository, communication pathway). Furthermore, perspectives on information security assurance have been identified, with a focus on information properties, primarily complemented by non-repudiation and authenticity. This has resulted in the proposal of additional SysML stereotypes to transform the defined perspectives.</p><p>A method for presenting and justifying the design of information security management systems, called REISMSAD, has been proposed. Its application is oriented toward developing and documenting architectural decisions, as well as justifying the project. It encompasses three types of architectural knowledge: design issues (the "Interest" element), design decisions (the "Architecture Description" element), and project design results (the "Architecture" element). The proposed method facilitates justification through quantitative and qualitative aspects, as well as the use of alternative architectures. This has led to the formulation of a task for verifying architectural decisions within information security management systems, allowing for the application of formal methods based on LTS for this purpose.</p><p>Therefore, the use of model-based systems engineering enables a shift away from a documentbased approach to constructing architectural models of information security management systems. This approach achieves uniformity in representations, primarily from the perspectives of various stakeholders. The SysML modeling language serves as the foundation for such formalization.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure1: Relationship between "Threat-Risk"<ref type="bibr" target="#b4">[5]</ref> </figDesc><graphic coords="4,164.04,141.00,266.28,144.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Threat Agent Profile Model</figDesc><graphic coords="4,86.76,314.64,421.20,410.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure</head><label></label><figDesc>Figure2presents a series of interconnected stereotypes that can be applied to blocks when modeling information security management systems. In addition to the concepts presented in Figure1, the SysML Threat Agent Profile describes how threats result from threat agents and reveals the information assets that are vulnerable due to the exploitation of vulnerabilities by known threats.Threat agents can be either human or computational devices (such as tablets or laptops) infected with malicious software and capable of transmitting additional malicious payloads. Human threats refer to actions (such as inserting a USB drive into a computer or deliberately disabling security systems), while computational threats are modeled as actions that spread malicious software packages or initiate more general threats (such as sending malicious commands). Computational devices serve as both sources of threats and information assets that need to be protected due to the potential for cascading attacks with multiple malicious payloads.The model also illustrates how countermeasures are defined based on risk assessments of specific threat agents, thereby closing the loop from threat agent to countermeasure.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Data Model Profile</figDesc><graphic coords="5,72.00,374.88,450.96,162.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Model of the information security management system architecture</figDesc><graphic coords="9,72.00,141.00,451.08,432.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Cause-Effect Relationship between 𝐶𝐴𝐸 and 𝐴𝑅</figDesc><graphic coords="10,114.36,538.68,366.36,143.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head></head><label></label><figDesc>𝑅𝐸𝐼𝑆𝑀𝑆𝐴𝐷 = (𝐶𝐴𝐸 , 𝐶𝐴𝐸 , 𝐴𝑅 , 𝑅 , Σ , 𝐿 ), -historical architecture model, and the following conditions hold: 𝐶𝐴𝐸 ⊆ 𝐶𝐴𝐸; 𝐴𝑅 ⊆ 𝐴𝑅; 𝐴 ⊆ 𝐴; Σ ⊆ Σ; 𝐶𝐴𝐸 ⊆ 𝐶𝐴𝐸 ; 𝐿 : 𝐶𝐴𝐸 → 2 ; 𝑅 ⊆ 𝑅 ∩ (𝐶𝐴𝐸 × 𝐴𝑅 ) ∪ (𝐴𝑅 × 𝐶𝐴𝐸 ) , there is no subset of the set 𝑅 that forms a directed cycle; and for which the following conditions hold: 1. 𝐶𝐴𝐸 = 𝐶𝐴𝐸 \ 𝐶𝐴𝐸 . 2. 𝐴𝑅 = 𝐴𝑅 \ 𝐴𝑅 . 3. 𝐴 = 𝐴𝑅 \ 𝐴 . 4. Σ = Σ \ Σ . 5. 𝐶𝐴𝐸 = 𝐶𝐴𝐸 \ 𝐶𝐴𝐸 . 6. 𝐿 = 𝐿 \ 𝐿 . The corresponding model diagram is presented in Figure 6.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Diagram of the extended model REISMSADe</figDesc><graphic coords="12,117.60,347.40,359.28,155.76" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Entity of Interest: Describes the subject of the architecture description. 6. Environment: Describes the context, conditions, and impact on the "Entity of Interest." 7. Concern: Describes the stakeholder's concern that is important to them. 8. Aspect: Describes a specific part of the character or nature of the "Entity of Interest." 9. Architecture View: Describes a specific informational component that is part of the "Architecture Description." 10. Architecture Viewpoint: Describes a set of conventions, interpretations, and uses of the "Architecture View" to highlight one or more "Concerns." 11. Model Kind: Describes the model category, distinguished by its key characteristics and modeling conventions.</figDesc><table /><note>2. Architecture: Represents the architecture as an entity. 3. Stakeholder: Describes the role, position, person, or organization that has an interest, right, share, or requirement regarding the "Entity of Interest." 4. Stakeholder Perspective: Describes the stakeholder's perspective on the "Entity of Interest" within its "Concern." 5. 12. View Component: Describes a specific part of one or more "Architecture Views." 13. Model-Based View Component: Describes a specific part of one or more "Architecture Views" that is governed or formulated by a specific "Model Kind." 14. Non-model Based View Component: Describes a specific part of one or more "Architecture</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>To address this need, an extended REISMSAD model is proposed.</figDesc><table><row><cell cols="3">Definition 2. The Extended REISMSAD Model is a labeled transitive system</cell></row><row><cell></cell><cell></cell><cell>𝑅𝐸𝐼𝑆𝑀𝑆𝐴𝐷𝑒 = (𝐶𝐴𝐸, 𝐶𝐴𝐸 , 𝐴𝑅, 𝐴, 𝑅, Σ, 𝐿),</cell></row><row><cell cols="3">with a bijective mapping function 𝑆𝑆𝑓: (𝐶𝐴𝐸 → 𝐶𝐴𝐸 ) ∪ (𝐴𝑅 → 𝐴𝑅 ) for each architectural element</cell></row><row><cell cols="3">or descriptions of architecture, where:</cell></row><row><cell></cell><cell cols="2">𝑅𝐸𝐼𝑆𝑀𝑆𝐴𝐷 = (𝐶𝐴𝐸 , 𝐶𝐴𝐸 , 𝐴𝑅 , 𝐴 , 𝑅 , Σ , 𝐿 )</cell></row><row><cell cols="3">current model of architecture, and the following conditions are satisfied:</cell></row><row><cell>𝐶𝐴𝐸</cell><cell>⊆ 𝐶𝐴𝐸;</cell></row><row><cell>𝐴𝑅</cell><cell>⊆ 𝐴𝑅;</cell></row><row><cell>𝐴</cell><cell>⊆ 𝐴;</cell></row><row><cell>Σ</cell><cell>⊆ Σ;</cell></row><row><cell>𝐶𝐴𝐸</cell><cell>⊆ 𝐶𝐴𝐸 ;</cell></row><row><cell cols="2">𝐿 : 𝐶𝐴𝐸 → 2</cell><cell>;</cell></row><row><cell>𝑅</cell><cell cols="2">⊆ 𝑅 ∩ (𝐶𝐴𝐸 × 𝐴𝑅 ) ∪ (𝐴𝑅 × 𝐶𝐴𝐸 ) ,</cell></row><row><cell cols="2">there is no subset of 𝑅</cell><cell>that forms a directed cycle;</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>The authors would like to express their gratitude to colleagues who participated in discussions on the research materials presented at various scientific and technical seminars and conferences.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www.iso.org/standard/74393.html" />
		<title level="m">ISO/IEC/IEEE 42010, Software, systems and enterprise. Architecture description</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://www.iso.org/standard/81702.html" />
		<title level="m">Systems and software engineering. System life cycle processes</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
	<note>ISO/IEC/IEEE 15288</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Probabilistic criterion of information security management system development</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mokhor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">О</forename><surname>Bakalynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tsurkan</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2577/paper13.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the XIX International scientific and practical conference Information Technologies and Security, ITS 2023</title>
		<title level="s">CEUR Workshop</title>
		<meeting>the XIX International scientific and practical conference Information Technologies and Security, ITS 2023<address><addrLine>Aachen, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">2577</biblScope>
			<biblScope unit="page" from="159" to="168" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<idno>ISO/IEC 27001</idno>
		<ptr target="https://www.iso.org/standard/27001" />
		<title level="m">Information security, cybersecurity and privacy protection. Information security management systems. Requirements</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<idno>ISO/IEC 21827</idno>
		<ptr target="https://www.iso.org/standard/44716.html" />
		<title level="m">Information technology. Security techniques. Systems Security Engineering. Capability Maturity Model® (SSE-CMM®)</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<idno>ISO/IEC 27032</idno>
		<ptr target="https://www.iso.org/standard/76070.html" />
		<title level="m">Cybersecurity. Guidelines for Internet security</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<idno>ISO/IEC 27005</idno>
		<ptr target="https://www.iso.org/standard/80585.html" />
		<title level="m">Information security, cybersecurity and privacy protection. Guidance on managing information security risks</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<idno>CMU/SEI-2009-TR-010</idno>
		<ptr target="https://insights.sei.cmu.edu/documents/813/2009_005_001_15110.pdf" />
		<title level="m">Secure Design Patterns</title>
				<imprint>
			<date type="published" when="2009">2009. 2009</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">UMLsec: Extending UML for Secure Systems Development</title>
		<author>
			<persName><forename type="first">J</forename><surname>Jürjens</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-45800-X_32</idno>
	</analytic>
	<monogr>
		<title level="m">UML&quot; 2002 -The Unified Modeling Language. UML 2002</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Jézéquel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Hussmann</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Cook</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2460</biblScope>
			<biblScope unit="page" from="412" to="425" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Secure Systems Development with UML</title>
		<author>
			<persName><forename type="first">J</forename><surname>Jürjens</surname></persName>
		</author>
		<idno type="DOI">10.1007/b137706</idno>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="URL:www.evita-project.org" />
		<title level="m">EVITA: E-safety vehicle intrusion protected applications</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties</title>
		<author>
			<persName><forename type="first">G</forename><surname>Pedroza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Apvrille</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Knorreck</surname></persName>
		</author>
		<idno type="DOI">10.1109/NOTERE.2011.5957992</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems</title>
				<meeting>the 11th Annual International Conference on New Technologies of Distributed Systems<address><addrLine>Paris, France</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Xplore</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Service Orientated Architecture Support in Various Architecture Frameworks: A Brief Review</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Jamjoom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Alghamdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Ahmad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the World Congress on Engineering and Computer Science, IMECS 2012</title>
				<meeting>the World Congress on Engineering and Computer Science, IMECS 2012<address><addrLine>San Francisco, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Newswood Limited</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">II</biblScope>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Meta model of compensatory-decompensational approach for architecture of critical it infrastructure designing</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Dorogyy</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCSET.2018.8336191</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018</title>
				<meeting>the 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018<address><addrLine>Lviv-Slavske, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="223" to="228" />
		</imprint>
	</monogr>
	<note>IEEE Xplore</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">CySeMoL: A tool for cyber security analysis of enterprises</title>
		<author>
			<persName><forename type="first">H</forename><surname>Holm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sommestadm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ekstedt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Nordström</surname></persName>
		</author>
		<idno type="DOI">10.1049/cp.2013.1077</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd International Conference and Exhibition on Electricity Distribution, CIRED 2013, IEEE Xplore</title>
				<meeting>the 22nd International Conference and Exhibition on Electricity Distribution, CIRED 2013, IEEE Xplore<address><addrLine>Stockholm, Sweden</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Availability of a SCADA/OMS/DMS System -A Case Study</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Franke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Holm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Nordstrom</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISGTEUROPE.2010.5638912</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe</title>
				<meeting>the IEEE PES Innovative Smart Grid Technologies Conference Europe<address><addrLine>ISGT Europe; Gothenburg, Sweden</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010. 2010</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
	<note>IEEE Xplore</note>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="https://www.omg.org/spec/SysML/1.6" />
		<title level="m">OMG Systems Modeling Language</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Methods for Investigating Properties of High-performance Infrastructures</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">F</forename><surname>Telenyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The review, Control systems and computers</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="3" to="13" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A survey of parametric model verification methods</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">Y</forename><surname>Dorogyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Tsurkan</surname></persName>
		</author>
		<idno type="DOI">10.15589/znp2020.1(479).10</idno>
	</analytic>
	<monogr>
		<title level="j">Collection of scientific publications of NUS</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="82" to="90" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
