Abstract
This paper presents a generator of ISO/IEC 15408 security target templates, named “GEST,” that can automatically generate security target templates for target information systems from evaluated and certified security targets. GEST can choose certified security targets resembling target system according to keywords inputted by users, and detect and correct discordance of templates. By using GEST, designers with a little experience can easily get security target templates as the basis to create security targets of target systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Advanced Information Systems Engineering Laboratory, Saitama University: GEST: Security Target Template Generator, http://iseds.aise.ics.saitama-u.ac.jp/posta/
Bahl, L., Jelinek, F., Mercer, R.: A Statistical Approach to Continuous Speech Recognition. IEEE Trans. on PAMI (1983)
Cheng, J., Goto, Y., Morimoto, S., Horie, D.: A Security Engineering Environment Based on ISO/IEC Standards: Providing Standard, Formal, and Consistent Supoprts for Design Development, Operation, and Maintenance of Secure Information Systems. In: Proceedings of the 2nd International Conference on Information Security and Assurance (ISA 2008), pp. 350–354. IEEE Computer Society Press, Busan (2008)
Common Criteria Project: CEM v3.1, http://www.commoncriteriaportal.org/thecc.html
Common Criteria Project: Common Criteria Portal, http://www.commoncriteriaportal.org/
Goldstein, H., Shannon, D., Bolling, R., Rustici, E.: Document Generation Apparatus and Methods. European Patent (1997)
Horie, D., Morimoto, S., Azimah, N., Goto, Y., Cheng, J.: ISEDS: An Information Security Engineering Database System Based on ISO Standards. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008), pp. 1219–1225. IEEE Computer Society Press, Barcelona (2008)
IEEE: IEEE 830-1998 Recommended Practice for Software Requirements Specifications, http://ieeexplore.ieee.org/xpl/freeabs_all.jsp
Information-Technology Promotion Agency, Japan: JISEC (Japan Information Technology Security Evaluation and Certification Scheme), http://www.ipa.go.jp/security/jisec/jisec_e/index.html
Leacock, C., Towell, G., Voorhees, E.: Corpus-based Statistical Sense Resolution. In: Proceedings of the ARPA Workshop on Human Language Technology pp. 260–265 (1993)
Reiter, E., Mellish, C., Levine, J.: Automatic Generation of Technical Documentation. Applied Artificial Intelligence 9(3), 259–287 (1995)
Robert Lemos: Linux Makes a Run for Government, http://www.news.com/2100-1001-950083.html
Salton, G., Buckley, C.: Term-weighting Approaches in Automatic Text Retrieval. Information Processing and Management: an International Journal 6(4), 205–219 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Horie, D., Yajima, K., Azimah, N., Goto, Y., Cheng, J. (2009). GEST: A Generator of ISO/IEC 15408 Security Target Templates. In: Lee, R., Hu, G., Miao, H. (eds) Computer and Information Science 2009. Studies in Computational Intelligence, vol 208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01209-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-01209-9_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01208-2
Online ISBN: 978-3-642-01209-9
eBook Packages: EngineeringEngineering (R0)