Skip to main content

GEST: A Generator of ISO/IEC 15408 Security Target Templates

  • Chapter
Book cover Computer and Information Science 2009

Part of the book series: Studies in Computational Intelligence ((SCI,volume 208))

Abstract

This paper presents a generator of ISO/IEC 15408 security target templates, named “GEST,” that can automatically generate security target templates for target information systems from evaluated and certified security targets. GEST can choose certified security targets resembling target system according to keywords inputted by users, and detect and correct discordance of templates. By using GEST, designers with a little experience can easily get security target templates as the basis to create security targets of target systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Advanced Information Systems Engineering Laboratory, Saitama University: GEST: Security Target Template Generator, http://iseds.aise.ics.saitama-u.ac.jp/posta/

  2. Bahl, L., Jelinek, F., Mercer, R.: A Statistical Approach to Continuous Speech Recognition. IEEE Trans. on PAMI (1983)

    Google Scholar 

  3. Cheng, J., Goto, Y., Morimoto, S., Horie, D.: A Security Engineering Environment Based on ISO/IEC Standards: Providing Standard, Formal, and Consistent Supoprts for Design Development, Operation, and Maintenance of Secure Information Systems. In: Proceedings of the 2nd International Conference on Information Security and Assurance (ISA 2008), pp. 350–354. IEEE Computer Society Press, Busan (2008)

    Chapter  Google Scholar 

  4. Common Criteria Project: CEM v3.1, http://www.commoncriteriaportal.org/thecc.html

  5. Common Criteria Project: Common Criteria Portal, http://www.commoncriteriaportal.org/

  6. Goldstein, H., Shannon, D., Bolling, R., Rustici, E.: Document Generation Apparatus and Methods. European Patent (1997)

    Google Scholar 

  7. Horie, D., Morimoto, S., Azimah, N., Goto, Y., Cheng, J.: ISEDS: An Information Security Engineering Database System Based on ISO Standards. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008), pp. 1219–1225. IEEE Computer Society Press, Barcelona (2008)

    Chapter  Google Scholar 

  8. IEEE: IEEE 830-1998 Recommended Practice for Software Requirements Specifications, http://ieeexplore.ieee.org/xpl/freeabs_all.jsp

  9. Information-Technology Promotion Agency, Japan: JISEC (Japan Information Technology Security Evaluation and Certification Scheme), http://www.ipa.go.jp/security/jisec/jisec_e/index.html

  10. Leacock, C., Towell, G., Voorhees, E.: Corpus-based Statistical Sense Resolution. In: Proceedings of the ARPA Workshop on Human Language Technology pp. 260–265 (1993)

    Google Scholar 

  11. Reiter, E., Mellish, C., Levine, J.: Automatic Generation of Technical Documentation. Applied Artificial Intelligence 9(3), 259–287 (1995)

    Article  Google Scholar 

  12. Robert Lemos: Linux Makes a Run for Government, http://www.news.com/2100-1001-950083.html

  13. Salton, G., Buckley, C.: Term-weighting Approaches in Automatic Text Retrieval. Information Processing and Management: an International Journal 6(4), 205–219 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Horie, D., Yajima, K., Azimah, N., Goto, Y., Cheng, J. (2009). GEST: A Generator of ISO/IEC 15408 Security Target Templates. In: Lee, R., Hu, G., Miao, H. (eds) Computer and Information Science 2009. Studies in Computational Intelligence, vol 208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01209-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01209-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01208-2

  • Online ISBN: 978-3-642-01209-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics