An optimal decision method for establishment of security objectives (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  41 ,  8  ;  2264-2271  ;  2000
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

For the establishment of systematic information security countermeasures, the production of security policies or security objectives in a security design specification based on the international security evaluation standard ISO15408 has become more important. However, it is difficult to define the security objectives effectively and efficiently on complex mapping relationships between threats and objectives. We propose an optimal security objective decision method. The method provides the ability to determine the security objectives quantitatively from the viewpoint of effectiveness and efficiency. The method consists of two schemes. One is the derivation scheme of the security objective candidate sets for protection from possible threats by applying a minimal path set search algorithm on the fault trees (FT) with respect to the threats. The other is a decision scheme of optimal security objectives for minimizing the required cost by resolving a combinational optimization problem. Furthermore, we show the usefulness of the method in a case study.

Table of contents – Volume 41, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

2068
Generating shared RSA parameters for two communicating parties
Barmawi, A.M. / Takada, S. / Doi, N. | 2000
2092
Efficient construction of elliptic curves over optimal extension-field
Futa, Y. / Miyaji, A. | 2000
2102
The secure renewal of cryptosystems in the open network architecture
Yamada, T. / Miyaji, A. / Soshi, M. | 2000
2148
Anonymous communication with elementary cyclic routes
Kitazawa, S. / Nagano, S. / Soshi, M. / Miyaji, A. | 2000
2208
Applying legitimate access database for MLSI-based intrusion detection
Harada, S. / Asaka, M. | 2000
2228
Security analysis on the proactivized system against latent virus attacks
Watanabe, Y. / Imai, H. | 2000
2237
Software-based music delivery platform
Uda, R. / Sunada, A. / Inoue, A. / Shigeno, H. / Matsushita, Y. | 2000
2264
An optimal decision method for establishment of security objectives
Nagai, Y. / Fujiyama, T. / Sasaki, R. | 2000
2327
A macro system with class objects for the Java language
Tatsubori, M. / Chiba, S. / Itano, K. | 2000
Feedback