Skip to main content

Towards New Areas of Security Engineering

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3642))

Abstract

Nowadays, computer systems consist of many components such as servers and clients, protocols, services, and so on. Systems connected to network have become more complex, with research focused on performance and efficiency. While most of the attention in system security has been paid to encryption technology and protocols for securing data transactions, a weakness (security hole) in any component may comprise the whole system. Security engineering is needed for eliminating such holes. This paper outlines some novel challenges of security engineering, as well as their relations to other areas of scientific research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO/IEC, I.: 21827 Information technology - Systems Security Engineering Capability Maturity Model (SSE-CMM)

    Google Scholar 

  2. ISO/IEC, I.: TR 15504-2,5:1998 Information technology - Software process assessment - Parts 2,5

    Google Scholar 

  3. ISO/IEC, I.: 15408-1,2,3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Parts 1,2,3

    Google Scholar 

  4. Cha, B.-R., Park, K.-W., Seo, J.-H.: Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 254–263. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Kim, H.-K., Kim, T.-H., Kim, J.-S.: Reliability Assurance in Development Process for TOE on the Common Criteria. In: Ramamoorthy, C.V., Lee, R., Lee, K.W. (eds.) SERA 2003. LNCS, vol. 3026, pp. 364–375. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Kim, T.-H.: Approaches and Methods of Security Engineering. In: ICCMSE (2004)

    Google Scholar 

  7. Kim, T.-H., No, B.-G., Lee, D.-C.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Kim, T.-H., Lee, T.-S., Kim, M.-C., Kim, S.-M.: Relationship Between Assurance Class of CC and Product Development Process. In: The 6th Conference on Software Engineering Technology, SETC (2003)

    Google Scholar 

  9. Lee, W., Stolfo, S.J., Chan, P.K., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real Time Data Mining-based Intrusion Detection. IEEE, Los Alamitos (2001)

    Google Scholar 

  10. Snouffer, R., Lee, A., Oldehoeft, A.: A Comparison of the Security Requirements for Cryptographic Modules. FIPS 140-1 and FIPS 140-2, NIST Special Publication, 800-829 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Th., Hong, Ch., Kim, Ms. (2005). Towards New Areas of Security Engineering. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706_60

Download citation

  • DOI: https://doi.org/10.1007/11548706_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28660-8

  • Online ISBN: 978-3-540-31824-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics