A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling

نویسنده

  • Andrzej Bialas
چکیده

The paper deals with the IT security development process according to the Common Criteria, particularly the security problem definition of the target of evaluation (TOE), expressing basic security concerns and needs of the developed IT product or system. The conciseness and preciseness of these concerns and needs influence the security objectives specifications that, in turn, influence the design quality and, finally, the TOE assurance. The UML-based approach and the predefined set of enhanced generics are proposed. The paper shows the used high level ontology, its representation by generics and the operations defined on these generics. The paper deals with more extensive works concerning IT security modeling and the development of computer-aided tools. To conclude the issue, current results, experiences and plans were presented. The emphasis was put on UML-based designs which can be better understood by a wide community of UML users.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

A Solution to the Problem of Extrapolation in Car Following Modeling Using an online fuzzy Neural Network

Car following process is time-varying in essence, due to the involvement of human actions. This paper develops an adaptive technique for car following modeling in a traffic flow. The proposed technique includes an online fuzzy neural network (OFNN) which is able to adapt its rule-consequent parameters to the time-varying processes. The proposed OFNN is first trained by an growing binary tree le...

متن کامل

Analysis and Modeling of VoIP Servers: A Linear Programming Approach

The SIP protocol was standardized by the IETF at the application layer for initiating, managing, and terminating multimedia sessions and has been widely used as the main signaling protocol on both the Internet and VoIP networks. Most challenges in this protocol are overload and lack of proper state distribution. These challenges cause a wide range of next-generation network users to face a shar...

متن کامل

Resolving the food security problem with an interdisciplinary approach

Food is one of the basic human needsand providing it is directly related to food security. The concept of food security in its historical process has been debated from various aspects of physical and economical access to healthy and nutritious food at all times. Food insecurity is considered a complex policy problem with different aspects. This problem requires a network of communication among ...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006