Abstract
Nowadays, computer systems consist of many components such as servers and clients, protocols, services, and so on. Systems connected to network have become more complex, with research focused on performance and efficiency. While most of the attention in system security has been paid to encryption technology and protocols for securing data transactions, a weakness (security hole) in any component may comprise the whole system. Security engineering is needed for eliminating such holes. This paper outlines some novel challenges of security engineering, as well as their relations to other areas of scientific research.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ISO/IEC, I.: 21827 Information technology - Systems Security Engineering Capability Maturity Model (SSE-CMM)
ISO/IEC, I.: TR 15504-2,5:1998 Information technology - Software process assessment - Parts 2,5
ISO/IEC, I.: 15408-1,2,3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Parts 1,2,3
Cha, B.-R., Park, K.-W., Seo, J.-H.: Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 254–263. Springer, Heidelberg (2005)
Kim, H.-K., Kim, T.-H., Kim, J.-S.: Reliability Assurance in Development Process for TOE on the Common Criteria. In: Ramamoorthy, C.V., Lee, R., Lee, K.W. (eds.) SERA 2003. LNCS, vol. 3026, pp. 364–375. Springer, Heidelberg (2004)
Kim, T.-H.: Approaches and Methods of Security Engineering. In: ICCMSE (2004)
Kim, T.-H., No, B.-G., Lee, D.-C.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)
Kim, T.-H., Lee, T.-S., Kim, M.-C., Kim, S.-M.: Relationship Between Assurance Class of CC and Product Development Process. In: The 6th Conference on Software Engineering Technology, SETC (2003)
Lee, W., Stolfo, S.J., Chan, P.K., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real Time Data Mining-based Intrusion Detection. IEEE, Los Alamitos (2001)
Snouffer, R., Lee, A., Oldehoeft, A.: A Comparison of the Security Requirements for Cryptographic Modules. FIPS 140-1 and FIPS 140-2, NIST Special Publication, 800-829 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Th., Hong, Ch., Kim, Ms. (2005). Towards New Areas of Security Engineering. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706_60
Download citation
DOI: https://doi.org/10.1007/11548706_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28660-8
Online ISBN: 978-3-540-31824-8
eBook Packages: Computer ScienceComputer Science (R0)