Towards New Areas of Security Engineering (original) (raw)
Abstract
Nowadays, computer systems consist of many components such as servers and clients, protocols, services, and so on. Systems connected to network have become more complex, with research focused on performance and efficiency. While most of the attention in system security has been paid to encryption technology and protocols for securing data transactions, a weakness (security hole) in any component may comprise the whole system. Security engineering is needed for eliminating such holes. This paper outlines some novel challenges of security engineering, as well as their relations to other areas of scientific research.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- ISO/IEC, I.: 21827 Information technology - Systems Security Engineering Capability Maturity Model (SSE-CMM)
Google Scholar - ISO/IEC, I.: TR 15504-2,5:1998 Information technology - Software process assessment - Parts 2,5
Google Scholar - ISO/IEC, I.: 15408-1,2,3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Parts 1,2,3
Google Scholar - Cha, B.-R., Park, K.-W., Seo, J.-H.: Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 254–263. Springer, Heidelberg (2005)
Chapter Google Scholar - Kim, H.-K., Kim, T.-H., Kim, J.-S.: Reliability Assurance in Development Process for TOE on the Common Criteria. In: Ramamoorthy, C.V., Lee, R., Lee, K.W. (eds.) SERA 2003. LNCS, vol. 3026, pp. 364–375. Springer, Heidelberg (2004)
Chapter Google Scholar - Kim, T.-H.: Approaches and Methods of Security Engineering. In: ICCMSE (2004)
Google Scholar - Kim, T.-H., No, B.-G., Lee, D.-C.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)
Chapter Google Scholar - Kim, T.-H., Lee, T.-S., Kim, M.-C., Kim, S.-M.: Relationship Between Assurance Class of CC and Product Development Process. In: The 6th Conference on Software Engineering Technology, SETC (2003)
Google Scholar - Lee, W., Stolfo, S.J., Chan, P.K., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real Time Data Mining-based Intrusion Detection. IEEE, Los Alamitos (2001)
Google Scholar - Snouffer, R., Lee, A., Oldehoeft, A.: A Comparison of the Security Requirements for Cryptographic Modules. FIPS 140-1 and FIPS 140-2, NIST Special Publication, 800-829 (2001)
Google Scholar
Author information
Authors and Affiliations
- , San-7, Geoyeo-Dong, Songpa-Gu, Seoul, Korea
Tai-hoon Kim, Chang-hwa Hong & Myoung-sub Kim
Authors
- Tai-hoon Kim
- Chang-hwa Hong
- Myoung-sub Kim
Editor information
Editors and Affiliations
- Department of Computer Science, University of Regina, Regina, SK, S4S 0A2 Canada, Polish-Japanese Institute of Information Technology, Koszykowa 86, 02-008 Warsaw, P.O. Box, Poland
Dominik Ślęzak - Department of Computer Science, University of Regina, S4S 0A2, Regina, Saskatchewan, Canada
JingTao Yao & Wojciech Ziarko & - Department of Electrical and Computer Engineering, University of Manitoba, R3T 5V6, Winnipeg, Manitoba, Canada
James F. Peters - College of Computer and Information Engineering, Hehan University, Henan, China
Xiaohua Hu
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Th., Hong, Ch., Kim, Ms. (2005). Towards New Areas of Security Engineering. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706\_60
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/11548706\_60
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-28660-8
- Online ISBN: 978-3-540-31824-8
- eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.