Patterning Protection Profiles by UML for Security Specifications
CIMCA '05 Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce Vol-2 (CIMCA-IAWTIC'06) - Volume 02
Formal verification of security specifications with common criteria
Proceedings of the 2007 ACM symposium on Applied computing
A web user interface of the security requirement management database based on ISO/IEC 15408
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
A security requirement management database based on ISO/IEC 15408
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Hi-index | 0.00 |
In order to develop highly secure information systems, it is important to make a security specification of the systems, although it requires heavy labor. Thus database technologies have been applied to software engineering and information security engineering for practical reuse of security specifications. However, because the specifications do not have fixed layout, it is difficult to develop a flexible and useful library for the documents with conventional database technologies. Therefore, this paper proposes a security specification library with a schemaless native XML database. Users of the library can directly store and manage security specifications with any layout. Consequently, the library mitigates the labor for making security specifications.