Skip to main content

A Relationship Between Products Evaluation and IT Systems Assurance

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3681))

Abstract

IT systems consist on very many components and very complex, so the implementation of the security countermeasures needs more critical considerations. Indeed, IT systems contain many subsystems, and most of subsystems consist of one or more IT products. In this hierarchy structure, the security characteristics of each IT product may affect the total assurance of the IT systems. Therefore, the security should be considered at the base level of the IT systems, in other words, IT product the base of the IT systems. For this work, this paper presents our research results about the security and assurance relationship between IT products and IT systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, T.-H., No, B.-G., Lee, D.-c.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Kim, T.-h., Kim, H.-k.: The Reduction Method of Threat Phrases by Classifying Assets. In: ICCSA 2004, LNCS, vol. 3043, Part 1 (2004)

    Google Scholar 

  3. Kim, T.-h., Kim, H.-k.: A Relationship between Security Engineering and Security Evaluation. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 717–724. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Kim, T.-h., Lee, T.-s., Cho, K.-m., Lee, K.-g.: The Comparison Between The Level of Process Model and The Evaluation Assurance Level. The Journal of The Information Assurance 2(2) KIAS (2002)

    Google Scholar 

  5. Lee, E.-s., Lee, K.W., Kim, T.-h., Jung, I.-H., Lee, E.-s., Lee, K.-w., Kim, T.-h., Jung, I.-h.: Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 451–460. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Kim, T.-h., Lee, S.-y.: Design Procedure of IT Systems Security Countermeasures. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 468–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Kim, T.-h., Lee, S.-y.: Security Evaluation Targets for Enhancement of IT Systems Assurance. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 491–498. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Th., Lee, Sy. (2005). A Relationship Between Products Evaluation and IT Systems Assurance. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_160

Download citation

  • DOI: https://doi.org/10.1007/11552413_160

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28894-7

  • Online ISBN: 978-3-540-31983-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics