id author title date pages extension mime words sentences flesch summary cache txt work_47xmn44k3nccdfwsrtmwbae6ky Jinghua Yu Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) 2021 21 .pdf application/pdf 10161 1160 50 Process Analysis for Security (STPA-Sec) approach views losses as resulting from In this article, we propose a data-flow-based adaption of the STPA-Sec Keywords Security analysis, Complex interaction, Information-critical system, Data flow structure, Data-flow-based adaption of the System-Theoretic Process Analysis for Security Table 1 Summary of established security analysis approaches other than STPA-based ones. The STPA-based security analysis approach (STPA-Sec) has been used to identify another system-oriented scenario-based approach CHASSIS, the STPA-Sec views the The STPA-Sec only analyzes insecure possibilities related to this action at a functional level helps to identify more data-related threats than using STPA-Sec alone, this diagram based Furthermore, the STPA-Sec approach regards the security issue as one of the key threats In this article, we have proposed a data-flow-based approach for security analysis of Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) ./cache/work_47xmn44k3nccdfwsrtmwbae6ky.pdf ./txt/work_47xmn44k3nccdfwsrtmwbae6ky.txt