Skip to main content

The Application of an Object-Oriented Method in Information System Security Evaluation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3688))

Abstract

It’s essential for critical systems to measure their security status. However, the research on the information system security evaluation still faces many difficulties which are caused by the complexity of the system and the inexplicit relation between the component security and the system security. In this paper, an object-oriented information system security evaluation method is introduced, the security context object model and security evaluation object model are established. These models resolve the current problems and a set of information system security evaluation tools are developed according to these works. The application of the tools is introduced and the deficiencies which need further improvement are also pointed out.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Criteria of PRC. Computer Information System Security Protection Classifying Criteria, in Chinese (1999), Available at http://www.infosec.org.cn/fanv/03_22.htm

  2. Ghosh, A.K., McGraw, G.: An Approach for Certifying Security in Software Components. In: Proceedings of 21st NIST-NCSC National Information Systems Security Conference, pp. 42–48 (1998)

    Google Scholar 

  3. Han, J., Zheng, Y.: Security Characterisation and Integrity Assurance for Software Components and Component-Based Systems. In: Proceedings of 1998 Australasian Workshop on Software Architectures, Melbourne, pp. 83–89 (1998)

    Google Scholar 

  4. Clark Weissman. Penetration Testing. Technical report, Naval Research Laboratory, NRL Technical Memorandum 5540:082A (January 1995)

    Google Scholar 

  5. Yee, B.S.: Security Metrology and Monty Hall Problem (April 2001), Available at, http://www.cs.ucsd.edu/~bsy/pub/metrology.pdf

  6. Common Criteria Project Sponsoring Organisations, Common Criteria for Information Security Evaluation Part 1:Introduction and general model, Version 2.1 (August 1999)

    Google Scholar 

  7. http://icat.nist.gov/icat.cfm

  8. Herrmann, P., Krumm, H.: Object-oriented Security Analysis and Modeling. In: Proceedings of 9th International Conference on Telecommunication Systems – Modelling and Analysis, ATSMA, IFIP, Dallas, TX, USA, March 2001, pp. 21–32 (2001)

    Google Scholar 

  9. Bramlage, J.L.: A New Paradigm For Performing Risk Assessment. In: Proceedings of 20th National Information Systems Security Conference, Baltimore, Maryland, October 1997, pp. 565–576 (1997)

    Google Scholar 

  10. Olivier, M.S., von Solms, S.H.: An Object-based Version of the Path Context Model. International Journal of Computer Mathematics 49(3&4), 133–144 (1993)

    Article  MATH  Google Scholar 

  11. Barnett, B.: NOOSE – Networked Object-Oriented Security Examiner. In: Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, Louisiana, USA, December 3-8, pp. 369–378 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yan, Q., Shu, Hy. (2005). The Application of an Object-Oriented Method in Information System Security Evaluation. In: Winther, R., Gran, B.A., Dahll, G. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2005. Lecture Notes in Computer Science, vol 3688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11563228_27

Download citation

  • DOI: https://doi.org/10.1007/11563228_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29200-5

  • Online ISBN: 978-3-540-32000-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics