Hokkaido University Collection of Scholarly and Academic Papers >
Graduate School of Information Science and Technology / Faculty of Information Science and Technology >
Peer-reviewed Journal Articles, etc >
A Method for Describing Structure of System Security Based on Trust and Authentication
Title: | A Method for Describing Structure of System Security Based on Trust and Authentication |
Authors: | Maeda, Tsukasa Browse this author | Kurihara, Masahito Browse this author |
Keywords: | system description | system security | authentication |
Issue Date: | 18-Aug-2010 |
Publisher: | IEEE |
Journal Title: | 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (ICIS) |
Start Page: | 83 |
End Page: | 90 |
Publisher DOI: | 10.1109/ICIS.2010.69 |
Abstract: | In this paper, we propose a method by which frontline engineers in system development fields can readily describe the structure of the security of systems. This method, based on the assumption of the use of standard encryption technologies and existing cryptographic protocols, reveals hidden security threats and vulnerabilities of systems. It extracts only security elements that constitute the trust relationship of system components, describing the relation between the elements, and analyzing the relation. This method provides a valuable assistance tool to build secure systems, because it works as an efficient communication paradigm between stakeholders of a system to help them in understanding the security of the system and confirming that their security requirements are fulfilled. |
Conference Name: | International Conference on Computer and Information Science |
Conference Sequence: | 9 |
Conference Place: | Kaminoyama (Yamagata) |
Rights: | © 2010 IEEE. Reprinted, with permission, from Maeda, T., Kurihara, M., A Method for Describing Structure of System Security Based on Trust and Authentication, 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (ICIS), Aug. 2010. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Hokkaido University products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. |
Type: | proceedings (author version) |
URI: | http://hdl.handle.net/2115/46857 |
Appears in Collections: | 情報科学院・情報科学研究院 (Graduate School of Information Science and Technology / Faculty of Information Science and Technology) > 雑誌発表論文等 (Peer-reviewed Journal Articles, etc)
|
Submitter: 栗原 正仁
|