ISO 9000 versus CMM: standardization and certification of IS development
Information and Management
Context-Bounded model checking of concurrent software
TACAS'05 Proceedings of the 11th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Integrating physical programming to information security system management
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
WISA'07 Proceedings of the 8th international conference on Information security applications
Hi-index | 0.00 |
For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. A security institution in Korea faced the effectiveness of security engineering. To solve the problems of security engineering, the institution creates a security methodology called ISEM, and a tool called SENT. This paper presents ISEM methodology considering both product assurance and production processes take advantages in terms of quality and cost. ISEM methodology can make up for the current security engineering methodology. For support ISEM methodology, SENT tool, which is operated in Internet, support the production processes and the product assurances which ISEM demands automatically.