Induction and implementation of security requirements in each system block

Tai Hoon Kim, Kouich Sakurai, Sun Myung Hwang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When building some kinds of IT systems, security-related requirements must be considered. It is essential that not only the customer's requirements for software or systems functionality should be satisfied but also the security requirements imposed on the software or systems development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Though the customer's requirements must be implemented to software or systems perfectly, but these are not sufficient. The secure software or systems may be implemented by not only applying security products but also considering security requirement appended to customer's requirement. In this paper, we propose a security engineering based approach considering security when developing software or systems based on System Block Model.

Original languageEnglish
Title of host publicationAdvances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings
Pages694-701
Number of pages8
EditionPART 2
DOIs
Publication statusPublished - Dec 1 2007
Event13th International Multimedia Modeling Conference, MMM 2007 - Singapore, Singapore
Duration: Jan 9 2007Jan 12 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume4352 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other13th International Multimedia Modeling Conference, MMM 2007
CountrySingapore
CitySingapore
Period1/9/071/12/07

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Induction and implementation of security requirements in each system block'. Together they form a unique fingerprint.

  • Cite this

    Kim, T. H., Sakurai, K., & Hwang, S. M. (2007). Induction and implementation of security requirements in each system block. In Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings (PART 2 ed., pp. 694-701). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4352 LNCS, No. PART 2). https://doi.org/10.1007/978-3-540-69429-8_76