2006
DOI: 10.1007/11751595_129
|View full text |Cite
|
Sign up to set email alerts
|

A Security Requirement Management Database Based on ISO/IEC 15408

Abstract: Abstract. With the scale-spreading and diversification of information systems, security requirements for the systems are being more and more complicated. It is desirable to apply database technologies to information security engineering in order to manage the security requirements in design and development of the systems. This paper proposes a security requirement management database based on the international standard ISO/IEC 15408 that defines security functional requirements which should be satisfied by var… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Specifications verified in the verification process can be considered to be certified by ISO/IEC 15408. We are publishing the formalized criteria, and a database supporting the verification, on our web site [7,14].…”
Section: Discussionmentioning
confidence: 99%
“…Specifications verified in the verification process can be considered to be certified by ISO/IEC 15408. We are publishing the formalized criteria, and a database supporting the verification, on our web site [7,14].…”
Section: Discussionmentioning
confidence: 99%
“…There are existing tools used for managing and querying data sets for domains similar to ICPS. For instance, in [10] authors discuss an approach to store information related to security standards in relational databases and Structured Query Language (SQL) is used for data retrieval. In [11], authors have discussed an approach to store security requirements in a schema less XML database.…”
Section: Introductionmentioning
confidence: 99%
“…In [14], authors have proposed an approach based on graph databases for genome sequencing. The approaches discussed so far, except [10] use graph theory concepts to handle and inquiry data. In this paper, we present a tool that uses a graph database to store the P2660.1 data set and, automates the analysis of existing interfacing practices on user-defined selection criteria.…”
Section: Introductionmentioning
confidence: 99%
“…The security requirement management database, named ISEDS, can manage data of specifications which are designed in conformity to ISO/IEC 15408 common criteria [1,4]. The criteria define security functional requirements which should be applied to validate an information system [2].…”
Section: The Security Requirement Management Databasementioning
confidence: 99%
“…Thus, we have developed a security requirement management database with a relational database, which supports development of secure information systems [1,4]. Users of the database can effectively manage and reuse security requirements in security specifications.…”
Section: Introductionmentioning
confidence: 99%