For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations, A security institution in Korea faced the effectiveness of security engineering. To solve the problems of security engineering, the institution creates a security methodology called ISEM, and a tool called SENT. This paper presents ISEM methodology considering both product assurance and production processes take advantages in terms of quality and cost. ISEM methodology can make up for the current security engineering methodology. For support ISEM methodology, SENT tool, which is operated in Internet, support the production processes and the product assurances which ISEM demands automatically. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Lee, S. Y., Chung, T. M., & Choi, M. (2006). An empirical study of quality and cost based security engineering. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3903 LNCS, pp. 379–389). Springer Verlag. https://doi.org/10.1007/11689522_35
Mendeley helps you to discover research relevant for your work.