An empirical study of quality and cost based security engineering

4Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations, A security institution in Korea faced the effectiveness of security engineering. To solve the problems of security engineering, the institution creates a security methodology called ISEM, and a tool called SENT. This paper presents ISEM methodology considering both product assurance and production processes take advantages in terms of quality and cost. ISEM methodology can make up for the current security engineering methodology. For support ISEM methodology, SENT tool, which is operated in Internet, support the production processes and the product assurances which ISEM demands automatically. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Lee, S. Y., Chung, T. M., & Choi, M. (2006). An empirical study of quality and cost based security engineering. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3903 LNCS, pp. 379–389). Springer Verlag. https://doi.org/10.1007/11689522_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free