HUSCAP logo Hokkaido Univ. logo

Hokkaido University Collection of Scholarly and Academic Papers >
Graduate School of Information Science and Technology / Faculty of Information Science and Technology >
Peer-reviewed Journal Articles, etc >

A Method for Describing Structure of System Security Based on Trust and Authentication

Files in This Item:
CIS_83-90.pdf274.24 kBPDFView/Open
Please use this identifier to cite or link to this item:http://hdl.handle.net/2115/46857

Title: A Method for Describing Structure of System Security Based on Trust and Authentication
Authors: Maeda, Tsukasa Browse this author
Kurihara, Masahito Browse this author
Keywords: system description
system security
authentication
Issue Date: 18-Aug-2010
Publisher: IEEE
Journal Title: 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (ICIS)
Start Page: 83
End Page: 90
Publisher DOI: 10.1109/ICIS.2010.69
Abstract: In this paper, we propose a method by which frontline engineers in system development fields can readily describe the structure of the security of systems. This method, based on the assumption of the use of standard encryption technologies and existing cryptographic protocols, reveals hidden security threats and vulnerabilities of systems. It extracts only security elements that constitute the trust relationship of system components, describing the relation between the elements, and analyzing the relation. This method provides a valuable assistance tool to build secure systems, because it works as an efficient communication paradigm between stakeholders of a system to help them in understanding the security of the system and confirming that their security requirements are fulfilled.
Conference Name: International Conference on Computer and Information Science
Conference Sequence: 9
Conference Place: Kaminoyama (Yamagata)
Rights: © 2010 IEEE. Reprinted, with permission, from Maeda, T., Kurihara, M., A Method for Describing Structure of System Security Based on Trust and Authentication, 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (ICIS), Aug. 2010. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Hokkaido University products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Type: proceedings (author version)
URI: http://hdl.handle.net/2115/46857
Appears in Collections:情報科学院・情報科学研究院 (Graduate School of Information Science and Technology / Faculty of Information Science and Technology) > 雑誌発表論文等 (Peer-reviewed Journal Articles, etc)

Submitter: 栗原 正仁

Export metadata:

OAI-PMH ( junii2 , jpcoar_1.0 )

MathJax is now OFF:


 

 - Hokkaido University