The search functionality is under construction.
The search functionality is under construction.

An Evaluation of Security Requirements Based on the Capability Model

Tetsuya MORIZUMI, Hiroshi NAGASE, Toyofumi TAKENAKA, Koichi YAMASHITA

  • Full Text Views

    0

  • Cite this

Summary :

This paper studies the evaluation of information flow and access guard mechanism in information system, based on process requirements occured at business and security requirements which prohibit information leakage to subjects of "conflict of interest". For the evaluation, process requirements are described by read, append matrix of subject row and object column (S-O matrix), and then the S-O matrix is evaluated by security requirements. The method of the evaluation is the following, (1) it is prohibited that two conflicting subjects can directly read or append to each other's objects, (2) a subject that have a possibility of information leakage must be observed.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E74-A No.8 pp.2160-2165
Publication Date
1991/08/25
Publicized
Online ISSN
DOI
Type of Manuscript
Special Section PAPER (Special Issue on Cryptography and Information Security)
Category

Authors

Keyword