Towards New Areas of Security Engineering (original) (raw)

Abstract

Nowadays, computer systems consist of many components such as servers and clients, protocols, services, and so on. Systems connected to network have become more complex, with research focused on performance and efficiency. While most of the attention in system security has been paid to encryption technology and protocols for securing data transactions, a weakness (security hole) in any component may comprise the whole system. Security engineering is needed for eliminating such holes. This paper outlines some novel challenges of security engineering, as well as their relations to other areas of scientific research.

Preview

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ISO/IEC, I.: 21827 Information technology - Systems Security Engineering Capability Maturity Model (SSE-CMM)
    Google Scholar
  2. ISO/IEC, I.: TR 15504-2,5:1998 Information technology - Software process assessment - Parts 2,5
    Google Scholar
  3. ISO/IEC, I.: 15408-1,2,3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Parts 1,2,3
    Google Scholar
  4. Cha, B.-R., Park, K.-W., Seo, J.-H.: Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 254–263. Springer, Heidelberg (2005)
    Chapter Google Scholar
  5. Kim, H.-K., Kim, T.-H., Kim, J.-S.: Reliability Assurance in Development Process for TOE on the Common Criteria. In: Ramamoorthy, C.V., Lee, R., Lee, K.W. (eds.) SERA 2003. LNCS, vol. 3026, pp. 364–375. Springer, Heidelberg (2004)
    Chapter Google Scholar
  6. Kim, T.-H.: Approaches and Methods of Security Engineering. In: ICCMSE (2004)
    Google Scholar
  7. Kim, T.-H., No, B.-G., Lee, D.-C.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)
    Chapter Google Scholar
  8. Kim, T.-H., Lee, T.-S., Kim, M.-C., Kim, S.-M.: Relationship Between Assurance Class of CC and Product Development Process. In: The 6th Conference on Software Engineering Technology, SETC (2003)
    Google Scholar
  9. Lee, W., Stolfo, S.J., Chan, P.K., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real Time Data Mining-based Intrusion Detection. IEEE, Los Alamitos (2001)
    Google Scholar
  10. Snouffer, R., Lee, A., Oldehoeft, A.: A Comparison of the Security Requirements for Cryptographic Modules. FIPS 140-1 and FIPS 140-2, NIST Special Publication, 800-829 (2001)
    Google Scholar

Download references

Author information

Authors and Affiliations

  1. , San-7, Geoyeo-Dong, Songpa-Gu, Seoul, Korea
    Tai-hoon Kim, Chang-hwa Hong & Myoung-sub Kim

Authors

  1. Tai-hoon Kim
  2. Chang-hwa Hong
  3. Myoung-sub Kim

Editor information

Editors and Affiliations

  1. Department of Computer Science, University of Regina, Regina, SK, S4S 0A2 Canada, Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, P.O. Box, Poland
    Dominik Ślęzak
  2. Department of Computer Science, University of Regina, S4S 0A2, Regina, Saskatchewan, Canada
    JingTao Yao & Wojciech Ziarko &
  3. Department of Electrical and Computer Engineering, University of Manitoba, R3T 5V6, Winnipeg, Manitoba, Canada
    James F. Peters
  4. College of Computer and Information Engineering, Hehan University, Henan, China
    Xiaohua Hu

Rights and permissions

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Th., Hong, Ch., Kim, Ms. (2005). Towards New Areas of Security Engineering. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706\_60

Download citation

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us