{"id":"https://openalex.org/W6887978331","doi":"https://doi.org/10.18420/inf2022_131","title":"Modeling Security Controls and System Assets As Autonomous Planning Tasks","display_name":"Modeling Security Controls and System Assets As Autonomous Planning Tasks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6887978331","doi":"https://doi.org/10.18420/inf2022_131"},"language":"en","primary_location":{"id":"doi:10.18420/inf2022_131","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_131","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2022_131","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Khalaf, Mahmoud","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Khalaf, Mahmoud","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Peters, Ludger","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peters, Ludger","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Waedt, Karl","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Waedt, Karl","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28422667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.6392999887466431,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.6392999887466431,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.1282999962568283,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.0723000019788742,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/planner","display_name":"Planner","score":0.5052000284194946},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5005000233650208},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4982999861240387},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4878000020980835},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.47450000047683716},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.43389999866485596},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.42329999804496765},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.38909998536109924}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6435999870300293},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5236999988555908},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5055000185966492},{"id":"https://openalex.org/C2776999362","wikidata":"https://www.wikidata.org/wiki/Q2349274","display_name":"Planner","level":2,"score":0.5052000284194946},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5005000233650208},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4982999861240387},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4878000020980835},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.47450000047683716},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43389999866485596},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.38909998536109924},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.3840999901294708},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3763999938964844},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.3450999855995178},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.33309999108314514},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.295199990272522},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2806999981403351},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.27149999141693115},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.27149999141693115},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.26739999651908875},{"id":"https://openalex.org/C18465707","wikidata":"https://www.wikidata.org/wiki/Q5001797","display_name":"Business system planning","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.2563000023365021}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2022_131","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_131","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2022_131","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_131","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Safety":[0],"I&amp;C":[1,7,72,104],"(Instrumentation":[2],"&amp;":[3,49],"Control)":[4],"and":[5,24,43,64,70,81,95,103,130],"Operational":[6],"programmable":[8],"digital":[9],"systems":[10,35],"are":[11,56,75],"growing":[12],"in":[13,92,106,147],"complexity":[14],"at":[15],"a":[16,61,132,167,183],"rapid":[17],"pace":[18],"while":[19],"system":[20,73,96,158],"designers,":[21],"project":[22],"architects,":[23],"cyber-security":[25],"engineers":[26],"work":[27],"tirelessly":[28],"to":[29],"ensure":[30],"the":[31,34,100,127,137,141,152,157],"safety":[32],"of":[33,41,185],"by":[36,46,60,98,113],"complying":[37],"with":[38],"long":[39],"lists":[40],"rules":[42],"regulations":[44],"dictated":[45],"relevant":[47],"regional":[48],"international":[50],"standards":[51,55],"[20;":[52],"BQB17].":[53],"These":[54],"updated,":[57],"withdrawn,":[58],"replaced":[59],"revised":[62],"edition,":[63],"amended":[65],"fairly":[66],"frequently.":[67],"Guaranteeing":[68],"new":[69],"existing":[71],"assets":[74,105],"still":[76],"compliant":[77],"is":[78],"arduous,":[79],"expensive,":[80],"time-consuming.":[82],"In":[83],"this":[84,148],"paper,":[85],"we":[86],"propose":[87],"an":[88],"approach":[89],"that":[90,135],"assists":[91],"security":[93,101,153,169],"modeling":[94],"design":[97],"formulating":[99],"controls":[102],"PDDL":[107],"domain":[108],"(Planning":[109],"Domain":[110],"Definition":[111],"Language":[112],"D.":[114],"McDermott":[115],"et":[116,188],"al.":[117,189],"[D":[118],"98]).":[119],"A":[120],"domain-independent":[121],"general":[122],"purpose":[123],"planner":[124],"can":[125,150,164],"explore":[126],"state":[128,139,146,163],"space":[129],"provide":[131],"deterministic":[133],"plan":[134],"transforms":[136],"initial":[138,145],"into":[140],"goal":[142,162],"state.":[143],"The":[144,161],"context":[149],"be":[151,165],"threats":[154],"from":[155],"which":[156],"needs":[159],"protection.":[160],"reaching":[166],"specific":[168],"degree":[170],"(S1,":[171],"S2,":[172],"S3),":[173],"satisfying":[174],"risk":[175],"management":[176],"requirements,":[177,179,181],"availability":[178],"performance":[180],"or":[182],"combination":[184],"them":[186],"Tellabi":[187],"[Te18].":[190]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
