skip to main content
10.1145/1854099.1854105acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Integral engineering technique for information security methodologies

Published:07 September 2010Publication History

ABSTRACT

A standards-based information security methodologies integral engineering (ISIE) technique is proposed that makes it possible to develop reliable and multipurpose procedural foundation for solving a wide range of theoretical and practical information security problems. The main technique matter concerns designing a generalized primary (root) semiformal (DFD and UML) domain models system that serves as the source for a wide range of secondary (derived) models for particular information security problems.

Within the ISIE framework, the derived models are obtained from the root model by extracting the necessary (for a given particular problem) partial model and its subsequent regulated modification: supplement, generalization, evolving etc. With these operations, the derived models, in general, remain coordinated with the root model and the corresponding IS standard that ensures the possibility of reuse of every particular derived model in other tasks.

The application of the proposed technique in several specific information security organizational problems is discussed, alongside with some logical schemes of common engineering operations.

References

  1. Białas, A. The ISMS Business Environment Elaboration Using a UML Approach In Software Engineering: Evolution and Emerging Technologies, K. Zieliński, T. Szmuc, Eds. IOS Press, Amsterdam, 99--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Białas, A. A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling. In Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006, 118--125. DOI= http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.6265Google ScholarGoogle Scholar
  3. Białas, A. Semiformal Approach to the IT Security Development In Proceedings of the International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2007, IEEE Computer Society, Los Alamitos, Washington, Tokyo, 3--11. DOI= http://doi.ieeecomputersociety.org/10.1109/DEPCOS-RELCOMEX.2007.43 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Peralta, K. P., Orozco, A. M., and Zorzo, A. F. Specifying Security Aspects in UML Models. In ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems, 2008, Toulouse, França. Proceedings of the Workshop on Modeling Security (MODSEC08), 2008. v. 1, 1--10. DOI= http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.7462Google ScholarGoogle Scholar
  5. Mayer, N., Dubois, E., Matulevicius, R. and Heymans P. Towards a Measurement Framework for Security Risk Management. In ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems, 2008, Toulouse, França. Proceedings of the Workshop on Modeling Security (MODSEC08), 2008. v. 1, 151--160. DOI= http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.8604Google ScholarGoogle Scholar
  6. Zaycev, O. E and Lyubimov, A. V. A technique of information technology security evaluation functional modeling according to Common Criteria. In Scientific and technical bulletin of Saint-Petersburg State University of Information Technologies, Mechanics and Optics, Vol. 56, ISSN 1819-222X, 3--9. (in Russian).Google ScholarGoogle Scholar
  7. Lyubimov, A. V. and Sukhanov, A. V. Semiformal models of information security standards. Information security issues No. 2 (81), 2008, ISSN 2073-2600, 52--57. (in Russian).Google ScholarGoogle Scholar
  8. Fedorchenko, L. N. and Zabolotsky, V. P. A linguistic toolbox for solving information security problems. Information security problems. Computer systems. No. 1, 2009, ISSN 2071-8217, 58--64. (in Russian).Google ScholarGoogle Scholar
  9. Lyubimov, A. V. Information security standards engineering: practical aspects. In Proceedings of XI International Conference "Regional informatics-2008" ("RI-2008"), St. Petersburg, Russia, October 22-24, 2008, ISBN 978-5-904030-11-7, 104. (in Russian).Google ScholarGoogle Scholar
  10. Cheremushkin, D. V. ISO/IEC 27000 standard series refinement on the basis of ISMS dictionary object model. In Proceedings of Young Scientists Conference, Issue 6, Saint-Petersburg, Russia, 2009, ISSN 978-5-7577-0335-0, 43--48. (in Russian).Google ScholarGoogle Scholar
  11. Shusticov, S. V. and Nekrasova E. A. Information security management system establishment by the use of functional models. In Proceedings of VI Saint-Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2009), St. Petersburg, October 28-30, 2009, ISBN 978-5-904031-05-3, 67.Google ScholarGoogle Scholar
  12. Cheremushkin D. V. and Potravnov A. S. Functional modeling of risk management process in compliance with ISO/IEC 27005:2008 standard. In Proceedings of VI St.-Petersburg Interregional Conference "Information Security of Russian Regions (ISRR-2009)", St. Petersburg, Russia, October 28-30, 2009, 76. (in Russian).Google ScholarGoogle Scholar
  13. Zaycev, O. E. Common Criteria functional model application technique and supporting software tool. In Proceedings of Young Scientists Conference, Issue 6, Saint-Petersburg, Russia, 2009, ISSN 978-5-7577-0335-0, 20--25. (in Russian).Google ScholarGoogle Scholar
  14. Lyubimov, A. V. Structural modeling of information security standards. In Proceedings of V St. Petersburg Interregional Conference "Information Security of Russian Regions-2007" ("ISSR-2007"), St. Petersburg, Russia, October 23-25, 2007, ISBN 978-5-85546-379-8, 123--127. (in Russian).Google ScholarGoogle Scholar

Index Terms

  1. Integral engineering technique for information security methodologies

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '10: Proceedings of the 3rd international conference on Security of information and networks
          September 2010
          286 pages
          ISBN:9781450302340
          DOI:10.1145/1854099

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 September 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader