Abstract
IT systems consist on very many components and very complex, so the implementation of the security countermeasures needs more critical considerations. Indeed, IT systems contain many subsystems, and most of subsystems consist of one or more IT products. In this hierarchy structure, the security characteristics of each IT product may affect the total assurance of the IT systems. Therefore, the security should be considered at the base level of the IT systems, in other words, IT product the base of the IT systems. For this work, this paper presents our research results about the security and assurance relationship between IT products and IT systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kim, T.-H., No, B.-G., Lee, D.-c.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)
Kim, T.-h., Kim, H.-k.: The Reduction Method of Threat Phrases by Classifying Assets. In: ICCSA 2004, LNCS, vol. 3043, Part 1 (2004)
Kim, T.-h., Kim, H.-k.: A Relationship between Security Engineering and Security Evaluation. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 717–724. Springer, Heidelberg (2004)
Kim, T.-h., Lee, T.-s., Cho, K.-m., Lee, K.-g.: The Comparison Between The Level of Process Model and The Evaluation Assurance Level. The Journal of The Information Assurance 2(2) KIAS (2002)
Lee, E.-s., Lee, K.W., Kim, T.-h., Jung, I.-H., Lee, E.-s., Lee, K.-w., Kim, T.-h., Jung, I.-h.: Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 451–460. Springer, Heidelberg (2004)
Kim, T.-h., Lee, S.-y.: Design Procedure of IT Systems Security Countermeasures. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 468–473. Springer, Heidelberg (2005)
Kim, T.-h., Lee, S.-y.: Security Evaluation Targets for Enhancement of IT Systems Assurance. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 491–498. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Th., Lee, Sy. (2005). A Relationship Between Products Evaluation and IT Systems Assurance. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_160
Download citation
DOI: https://doi.org/10.1007/11552413_160
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28894-7
Online ISBN: 978-3-540-31983-2
eBook Packages: Computer ScienceComputer Science (R0)