Introduction and evaluation of development system security process of ISO/IEC TR 15504

10Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This research is intended to develop the system security process. The IT products like as firewall, IDS (Intrusion Detection System) and VPN (Virtual Private Network) are made to perform special functions related to security, so the developers of these products or systems should consider many kinds of things related to security not only design itself but also development environment to protect integrity of products. When we are making these kinds of software products, ISO/IEC TR 15504 may provide a framework for the assessment of software processes, and this framework can be used by organizations involved in planning, monitoring, controlling, and improving the acquisition, supply, development, operation, evolution and support of software. But, in the ISO/IEC TR 15504, considerations for security are relatively poor to other security-related criteria such as ISO/IEC 21827 or ISO/IEC 15408 [10-12]. In fact, security related to software development is concerned with many kinds of measures that may be applied to the development environment or developer to protect the confidentiality and integrity of the IT product or system developed. In this paper we propose some measures related to development process security by analyzing the ISO/IEC 21827, the Systems Security Engineering Capability Maturity Model (SSE-CMM) and ISO/IEC 15408, Common Criteria (CC). And we present a Process of Security for ISO/IEC TR 15504. This enable estimation of development system security process by case study. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Lee, E. S., Lee, K. W., Kim, T. H., & Jung, I. H. (2004). Introduction and evaluation of development system security process of ISO/IEC TR 15504. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3043, 451–460. https://doi.org/10.1007/978-3-540-24707-4_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free