Induction and implementation of security requirements in each system block

Tai Hoon Kim, Kouich Sakurai, Sun Myung Hwang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When building some kinds of IT systems, security-related requirements must be considered. It is essential that not only the customer's requirements for software or systems functionality should be satisfied but also the security requirements imposed on the software or systems development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Though the customer's requirements must be implemented to software or systems perfectly, but these are not sufficient. The secure software or systems may be implemented by not only applying security products but also considering security requirement appended to customer's requirement. In this paper, we propose a security engineering based approach considering security when developing software or systems based on System Block Model.

Original languageEnglish
Title of host publicationAdvances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings
Pages694-701
Number of pages8
EditionPART 2
DOIs
Publication statusPublished - Dec 1 2007
Event13th International Multimedia Modeling Conference, MMM 2007 - Singapore, Singapore
Duration: Jan 9 2007Jan 12 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume4352 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other13th International Multimedia Modeling Conference, MMM 2007
CountrySingapore
CitySingapore
Period1/9/071/12/07

Fingerprint

Security systems
Proof by induction
Requirements
Customers
Software
System Development
Software Development
Sufficient
Engineering

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Kim, T. H., Sakurai, K., & Hwang, S. M. (2007). Induction and implementation of security requirements in each system block. In Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings (PART 2 ed., pp. 694-701). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4352 LNCS, No. PART 2). https://doi.org/10.1007/978-3-540-69429-8_76

Induction and implementation of security requirements in each system block. / Kim, Tai Hoon; Sakurai, Kouich; Hwang, Sun Myung.

Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2. ed. 2007. p. 694-701 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4352 LNCS, No. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, TH, Sakurai, K & Hwang, SM 2007, Induction and implementation of security requirements in each system block. in Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), no. PART 2, vol. 4352 LNCS, pp. 694-701, 13th International Multimedia Modeling Conference, MMM 2007, Singapore, Singapore, 1/9/07. https://doi.org/10.1007/978-3-540-69429-8_76
Kim TH, Sakurai K, Hwang SM. Induction and implementation of security requirements in each system block. In Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. 2007. p. 694-701. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 2). https://doi.org/10.1007/978-3-540-69429-8_76
Kim, Tai Hoon ; Sakurai, Kouich ; Hwang, Sun Myung. / Induction and implementation of security requirements in each system block. Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2. ed. 2007. pp. 694-701 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 2).
@inproceedings{c8e16a7fd44245ffa1ea60b6bed5185a,
title = "Induction and implementation of security requirements in each system block",
abstract = "When building some kinds of IT systems, security-related requirements must be considered. It is essential that not only the customer's requirements for software or systems functionality should be satisfied but also the security requirements imposed on the software or systems development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Though the customer's requirements must be implemented to software or systems perfectly, but these are not sufficient. The secure software or systems may be implemented by not only applying security products but also considering security requirement appended to customer's requirement. In this paper, we propose a security engineering based approach considering security when developing software or systems based on System Block Model.",
author = "Kim, {Tai Hoon} and Kouich Sakurai and Hwang, {Sun Myung}",
year = "2007",
month = "12",
day = "1",
doi = "10.1007/978-3-540-69429-8_76",
language = "English",
isbn = "9783540694281",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 2",
pages = "694--701",
booktitle = "Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings",
edition = "PART 2",

}

TY - GEN

T1 - Induction and implementation of security requirements in each system block

AU - Kim, Tai Hoon

AU - Sakurai, Kouich

AU - Hwang, Sun Myung

PY - 2007/12/1

Y1 - 2007/12/1

N2 - When building some kinds of IT systems, security-related requirements must be considered. It is essential that not only the customer's requirements for software or systems functionality should be satisfied but also the security requirements imposed on the software or systems development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Though the customer's requirements must be implemented to software or systems perfectly, but these are not sufficient. The secure software or systems may be implemented by not only applying security products but also considering security requirement appended to customer's requirement. In this paper, we propose a security engineering based approach considering security when developing software or systems based on System Block Model.

AB - When building some kinds of IT systems, security-related requirements must be considered. It is essential that not only the customer's requirements for software or systems functionality should be satisfied but also the security requirements imposed on the software or systems development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Though the customer's requirements must be implemented to software or systems perfectly, but these are not sufficient. The secure software or systems may be implemented by not only applying security products but also considering security requirement appended to customer's requirement. In this paper, we propose a security engineering based approach considering security when developing software or systems based on System Block Model.

UR - http://www.scopus.com/inward/record.url?scp=84886441291&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84886441291&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-69429-8_76

DO - 10.1007/978-3-540-69429-8_76

M3 - Conference contribution

AN - SCOPUS:84886441291

SN - 9783540694281

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 694

EP - 701

BT - Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings

ER -