Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.5.1125

A Study on Security Attribute Design in Security Plan of The Design Phase  

Shin, Seong-Yoon (School of Computer & Information Communication Engineering, Kunsan National University)
Abstract
In this paper, a method to identify components per unit task system is expressed with node, module, and interface. We define security subject per unit task system and explain node, module, and interface per component. According to the defined security standard in design phase, we also perform to design and elaborate security attributes for node and module as identified security subjects in their defined tables. And then we describe the composition standard for security attribute design with some examples, after classifying it into security subject, access subject, access control area, identification or verification area, and encryption.
Keywords
node; module; interface; security attribute;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Seong-Yoon Shin, " The Definitions of Security Requirements for Control Access on the Step of Analysis," J. of KSCI, Vol. 19, No. 11, pp. 97-103, 2014.
2 Korea Information Sedurity Agency, “Security Guide V 1.0 for secure software development and introduction”, 2008.
3 Data Expert Knowledge Potal(DBGuide.net), “DB Security Procedures and Technical Elements”, 2015.
4 Myoung-Gyu Jung and Man-Gon Park, "Consideration Factors in the Design Phase for Small Software Development Projects that are Difficult to Build Information Security Systems," Proceeding of KMMS, Vol. 13, No. 2, pp. 716-719, 2010.
5 Seong-Yoon Shin, Kil-Hyun Jeong, "Case Analysis of Legal System and Regulations according to the Needs of S/W Development Security," J. of KSCI, Vol. 19, No. 10, pp. 117-124, 2014.
6 Seong-Yoon Shin, " A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis," J. of KSCI, Vol. 19, No. 7, pp. 87-93, 2014.
7 Seong-Yoon Shin, Kang-Ho Lee, "A Study of Definition of Security Requirements on Encryption and Audit Logging," J. of KSCI, Vol. 19, No. 9, pp. 85-91, 2014.