{"id":1266,"date":"2022-01-24T07:59:32","date_gmt":"2022-01-24T12:59:32","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1266"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-a-security-property-decomposition-argument-pattern-for-structured-assurance-case-models","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2022\/new-publication-a-security-property-decomposition-argument-pattern-for-structured-assurance-case-models\/","title":{"rendered":"New Publication: A Security Property Decomposition Argument Pattern for Structured Assurance Case Models"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: A Security Property Decomposition Argument Pattern for Structured Assurance Case Models\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our new publication &#8220;<a href=\"https:\/\/doi.org\/10.1145\/3489449.3490001\">A Security Property Decomposition Argument Pattern for Structured Assurance Case Models<\/a>&#8221; is now published online. &nbsp;In this paper, we propose a security assurance argument pattern called <em>Security Property Decomposition<\/em>. This pattern is extracted by studying existing security assurance case models and their decomposition to argue the satisfaction of security properties such as confidentiality, integrity, and availability. It also considers the requirements prescribed by several prominent security standards for developing secure and trustworthy systems in different application domains. It was presented at the <a href=\"https:\/\/europlop.net\/content\/europlop-2021-proceedings\">26th European Conference on Pattern Languages of Programs (EuroPLoP 2021)<\/a> in July 2021. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a>&nbsp;for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our new publication &#8220;A Security Property Decomposition Argument Pattern for Structured Assurance Case Models&#8221; is now published online. &nbsp;In this paper, we propose a security assurance argument pattern called Security Property Decomposition. This pattern is extracted by studying existing security assurance case models and their decomposition to argue the satisfaction of security properties such as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1266"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1266\/revisions"}],"predecessor-version":[{"id":1267,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1266\/revisions\/1267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}