A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling
نویسنده
چکیده
The paper deals with the IT security development process according to the Common Criteria, particularly the security problem definition of the target of evaluation (TOE), expressing basic security concerns and needs of the developed IT product or system. The conciseness and preciseness of these concerns and needs influence the security objectives specifications that, in turn, influence the design quality and, finally, the TOE assurance. The UML-based approach and the predefined set of enhanced generics are proposed. The paper shows the used high level ontology, its representation by generics and the operations defined on these generics. The paper deals with more extensive works concerning IT security modeling and the development of computer-aided tools. To conclude the issue, current results, experiences and plans were presented. The emphasis was put on UML-based designs which can be better understood by a wide community of UML users.
منابع مشابه
Formal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملA Solution to the Problem of Extrapolation in Car Following Modeling Using an online fuzzy Neural Network
Car following process is time-varying in essence, due to the involvement of human actions. This paper develops an adaptive technique for car following modeling in a traffic flow. The proposed technique includes an online fuzzy neural network (OFNN) which is able to adapt its rule-consequent parameters to the time-varying processes. The proposed OFNN is first trained by an growing binary tree le...
متن کاملAnalysis and Modeling of VoIP Servers: A Linear Programming Approach
The SIP protocol was standardized by the IETF at the application layer for initiating, managing, and terminating multimedia sessions and has been widely used as the main signaling protocol on both the Internet and VoIP networks. Most challenges in this protocol are overload and lack of proper state distribution. These challenges cause a wide range of next-generation network users to face a shar...
متن کاملResolving the food security problem with an interdisciplinary approach
Food is one of the basic human needsand providing it is directly related to food security. The concept of food security in its historical process has been debated from various aspects of physical and economical access to healthy and nutritious food at all times. Food insecurity is considered a complex policy problem with different aspects. This problem requires a network of communication among ...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006