An optimal decision method for establishment of security objectives (Japanisch)

In: Transactions of the Information Processing Society of Japan   ;  41 ,  8  ;  2264-2271  ;  2000
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Print

Wie erhalte ich diesen Titel?

For the establishment of systematic information security countermeasures, the production of security policies or security objectives in a security design specification based on the international security evaluation standard ISO15408 has become more important. However, it is difficult to define the security objectives effectively and efficiently on complex mapping relationships between threats and objectives. We propose an optimal security objective decision method. The method provides the ability to determine the security objectives quantitatively from the viewpoint of effectiveness and efficiency. The method consists of two schemes. One is the derivation scheme of the security objective candidate sets for protection from possible threats by applying a minimal path set search algorithm on the fault trees (FT) with respect to the threats. The other is a decision scheme of optimal security objectives for minimizing the required cost by resolving a combinational optimization problem. Furthermore, we show the usefulness of the method in a case study.

Inhaltsverzeichnis – Band 41, Ausgabe 8

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

Generating shared RSA parameters for two communicating parties
Barmawi, A.M. / Takada, S. / Doi, N. | 2000
Efficient construction of elliptic curves over optimal extension-field
Futa, Y. / Miyaji, A. | 2000
The secure renewal of cryptosystems in the open network architecture
Yamada, T. / Miyaji, A. / Soshi, M. | 2000
Anonymous communication with elementary cyclic routes
Kitazawa, S. / Nagano, S. / Soshi, M. / Miyaji, A. | 2000
Applying legitimate access database for MLSI-based intrusion detection
Harada, S. / Asaka, M. | 2000
Security analysis on the proactivized system against latent virus attacks
Watanabe, Y. / Imai, H. | 2000
Software-based music delivery platform
Uda, R. / Sunada, A. / Inoue, A. / Shigeno, H. / Matsushita, Y. | 2000
An optimal decision method for establishment of security objectives
Nagai, Y. / Fujiyama, T. / Sasaki, R. | 2000
A macro system with class objects for the Java language
Tatsubori, M. / Chiba, S. / Itano, K. | 2000