Challenges and Opportunities in the Information Systems Security Evaluation and Position of ISO/IEC 15408

被引:0
|
作者
Vali, Nasser [1 ]
Modiri, Nasser
机构
[1] Azad Univ, Tehran North Branch, Tehran, Iran
关键词
Information System (IS); Security requirement; Security Strategies; Security Engineering; Security Evaluation; Security Policy; ISO/IEC; 15408;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations would encounter with challenges which leaving them would be impossible without any systematic and engineering approach and without any preparation of Secure Information System. The most important and greatest challenge is related to security of area that provides Information Systems. The main contribution of this work is providing a security standard-based process for software product line development. It is based on categories vulnerabilities and some concept of software engineering and use of the redefinition of information system life cycle, which integrated by Common Criteria (ISO/IEC 15408) controls into the product line lifecycle. Present approach reduces the complexity and ambiguity inherent in the information systems security in the engineering, well-defined, repeatability process. Thus, the security organizations which implement secure products ensure the security level their product and use time-cost effective and engineering process to improve their future product.
引用
收藏
页码:321 / +
页数:2
相关论文
共 50 条
  • [1] Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Sun, Wen
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 204 - 209
  • [2] A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Goto, Yuichi
    Cheng, Jingde
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2019 WORKSHOPS, 2019, 11607 : 3 - 14
  • [3] Advanced Security Assurance Case Based on ISO/IEC 15408
    Potii, Oleksandr
    Illiashenko, Oleg
    Komin, Dmitry
    [J]. THEORY AND ENGINEERING OF COMPLEX SYSTEMS AND DEPENDABILITY, 2015, 365 : 391 - 401
  • [4] GEST: A Generator of ISO/IEC 15408 Security Target Templates
    Horie, Daisuke
    Yajima, Kenichi
    Azimah, Noor
    Goto, Yuichi
    Cheng, Jingde
    [J]. COMPUTER AND INFORMATION SCIENCE 2009, 2009, 208 : 149 - 158
  • [5] Supporting Verification and Validation of Security Targets with ISO/IEC 15408
    Bao, Da
    Miura, Junichi
    Zhang, Ning
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2621 - 2628
  • [6] A security requirement management database based on ISO/IEC 15408
    Morimoto, S
    Horie, D
    Cheng, JD
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 1 - 10
  • [7] Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408
    Lee, Eun-Ser
    Kim, Haeng-Kon
    Hwang, Sun-Myoung
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 25 - +
  • [8] Providing Users With Suitable Services of Information Security Engineering Cloud Based on ISO/IEC 15408
    Xu, Liqing
    Wang, Bo
    Zhang, Ning
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 321 - 325
  • [9] Evaluation model for computer security software products based on ISO/IEC 15408 Common Criteria
    Alejandro Chamorro, Jose
    Pino, Francisco
    [J]. SISTEMAS & TELEMATICA, 2011, 9 (19): : 69 - 92
  • [10] FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408
    Yajima, Kenichi
    Morimoto, Shoichi
    Horie, Daisuke
    Azreen, Noor Sheila
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 624 - +