Threat description for the PP by using the concept of the assets protected by TOE
ICCS'03 Proceedings of the 2003 international conference on Computational science
S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
The general systems of today are composed of a number of components such as servers and clients, protocols, services, and so on. Systems connected to network have become more complex and wide, but the researches for the systems are focused on the 'performance' or 'efficiency'. While most of the attention in system security has been focused on encryption technology and protocols for securing the data transaction, it is critical to note that a weakness (or security hole) in any one of the components may comprise whole system. Security engineering is needed for reducing security holes may be included in the software. Therefore, more security-related researches are needed to reduce security weakness may be included in the software. This paper introduces some methods for reducing the threat to the system by applying security engineering, and proposes a method for building security countermeasure.