Designing quality databases with IDEF1X information models
Designing quality databases with IDEF1X information models
Patterning Protection Profiles by UML for Security Specifications
CIMCA '05 Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce Vol-2 (CIMCA-IAWTIC'06) - Volume 02
A security specification verification technique based on the international standard ISO/IEC 15408
Proceedings of the 2006 ACM symposium on Applied computing
Formal verification of security specifications with common criteria
Proceedings of the 2007 ACM symposium on Applied computing
A Security Specification Library with a Schemaless Database
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
A systematic review of security requirements engineering
Computer Standards & Interfaces
A web user interface of the security requirement management database based on ISO/IEC 15408
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
Hi-index | 0.00 |
With the scale-spreading and diversification of information systems, security requirements for the systems are being more and more complicated. It is desirable to apply database technologies to information security engineering in order to manage the security requirements in design and development of the systems. This paper proposes a security requirement management database based on the international standard ISO/IEC 15408 that defines security functional requirements which should be satisfied by various information systems. The database can aid design and development of information systems that require high security such that it enables to suitably refer to required data of security requirements.