Threat description for the PP by using the concept of the assets protected by TOE
ICCS'03 Proceedings of the 2003 international conference on Computational science
Design procedure of IT systems security countermeasures
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Security evaluation targets for enhancement of IT systems assurance
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Intelligent method for building security countermeasures
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Security requirements for ubiquitous software development site
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Hi-index | 0.00 |
IT systems consist on very many components and very complex, so the implementation of the security countermeasures needs more critical considerations. Indeed, IT systems contain many subsystems, and most of subsystems consist of one or more IT products. In this hierarchy structure, the security characteristics of each IT product may affect the total assurance of the IT systems. Therefore, the security should be considered at the base level of the IT systems, in other words, IT product the base of the IT systems. For this work, this paper presents our research results about the security and assurance relationship between IT products and IT systems.