Paper Abstract and Keywords |
Presentation |
2008-07-25 14:40
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
For covering various requirements for the evaluations of security measures for a system with good coordination among the solutions of different evaluations,it is required to establish a methodology for integrated evaluation of security measures for a system which can satisfy such requirement. In this paper we show the positions of the evaluations for individual security measures in the integrated evaluation and propose a practical approach to evaluate a basic unit of security measures which will link total evaluation of all security measures in a system with the issues to be solved for making proposed approach practical and being widely used. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Integrated evaluation of security measures / Methodology for evaluating each security / Layer structure of security measures / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 108, pp. 139-146, July 2008. |
Paper # |
|
Date of Issue |
2008-07-18 (ISEC) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Download PDF |
|
Conference Information |
Committee |
ISEC SITE IPSJ-CSEC |
Conference Date |
2008-07-24 - 2008-07-25 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Fukuoka Institute of System LSI Design Industry |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
IPSJ-CSEC |
Conference Code |
2008-07-ISEC-SITE-CSEC |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System |
Sub Title (in English) |
|
Keyword(1) |
Integrated evaluation of security measures |
Keyword(2) |
Methodology for evaluating each security |
Keyword(3) |
Layer structure of security measures |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takaaki Shigematsu |
1st Author's Affiliation |
Kyushu University (Kyushu Univ.) |
2nd Author's Name |
Bin-Hui Chou |
2nd Author's Affiliation |
Kyushu University (Kyushu Univ.) |
3rd Author's Name |
Yoshiaki Hori |
3rd Author's Affiliation |
Kyushu University (Kyushu Univ.) |
4th Author's Name |
Kouichi Sakurai |
4th Author's Affiliation |
Kyushu University (Kyushu Univ.) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2008-07-25 14:40:00 |
Presentation Time |
25 minutes |
Registration for |
IPSJ-CSEC |
Paper # |
ISEC2008-54 |
Volume (vol) |
vol.108 |
Number (no) |
no.162 |
Page |
pp.139-146 |
#Pages |
8 |
Date of Issue |
2008-07-18 (ISEC) |