[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Design Agent for the Reliable Web Security Requirement Control

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4496))

  • 797 Accesses

Abstract

This research is intended to design agent for the security requirement to estimate by empirical study. This paper is intended to help the design agent and progress management based on the ISO/IEC 15408. There are many defects that cause the security requirement problems during the web development. This paper remove the risk of the lifecycle and progress management that check the risk items in the web security requirements and also manage the schedule and quality problems. For projects in similar domains, it is possible to remove security risk items and to manage progress by using agent web security lifecycle and progress milestone, which can greatly improve the software process. The analysis is made based on the types required for making use of the defect data. In this case, additional measures must be taken besides merely recording defects. And the theory is apply to the agent web security access control system for the security requirement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model

    Google Scholar 

  2. ISO. ISO/IEC 15408-2:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements

    Google Scholar 

  3. ISO. ISO/IEC 15408-3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements

    Google Scholar 

  4. The Report of the President’s Commission on Critical Infrastructure Protection CCEB (Common Criteria Editorial Board), Common Criteria for Information Technology Security Evaluation, Version 2.0 (May 1998)

    Google Scholar 

  5. DOD (U.S. Department of Defense), Trusted Computer System Evaluation Criteria, DOD5200.28-STD, December 1985. 1.0, December 1992

    Google Scholar 

  6. ISO/IEC, Guide 65—General Requirements for Bodies Operating Product Certification Systems (1996)

    Google Scholar 

  7. Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–10 (September 1991)

    Google Scholar 

  8. Boehm, B.: Software Risk Management. IEEE Computer Society Press, Los Alamitos (1989)

    Book  Google Scholar 

  9. Boehm, B., Egyed, A., Kwan, J., Madachy, R.: Developing Multimedia Applications with the WinWin Spiral Model. In: Jazayeri, M. (ed.) ESEC 1997 and ESEC-FSE 1997. LNCS, vol. 1301, pp. 20–39. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  10. Boehm, B., Bose, P.: A Collaborative Spiral Process Model Based on Theory W. In: Proceedings, ICSP3, IEEE Computer Society Press, Los Alamitos (1994)

    Google Scholar 

  11. Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (August 2006)

    Google Scholar 

  12. Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (2006)

    Google Scholar 

  13. Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (August 2006)

    Google Scholar 

  14. Lee, E.-s., Lee, S.-H.: Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 555–564. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Pressman, R.S.: Software Engineering. McGraw-Hill, New York (1997)

    MATH  Google Scholar 

  16. Cho, N.-d., Lee, E.-s.: Design and implementation of semantic web search system using ontology and anchor text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 546–554. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Adam Grzech Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, ES., Bae, JM. (2007). Design Agent for the Reliable Web Security Requirement Control. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2007. Lecture Notes in Computer Science(), vol 4496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72830-6_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72830-6_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72829-0

  • Online ISBN: 978-3-540-72830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics