Abstract
This research is intended to design agent for the security requirement to estimate by empirical study. This paper is intended to help the design agent and progress management based on the ISO/IEC 15408. There are many defects that cause the security requirement problems during the web development. This paper remove the risk of the lifecycle and progress management that check the risk items in the web security requirements and also manage the schedule and quality problems. For projects in similar domains, it is possible to remove security risk items and to manage progress by using agent web security lifecycle and progress milestone, which can greatly improve the software process. The analysis is made based on the types required for making use of the defect data. In this case, additional measures must be taken besides merely recording defects. And the theory is apply to the agent web security access control system for the security requirement.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
ISO. ISO/IEC 15408-2:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements
ISO. ISO/IEC 15408-3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
The Report of the President’s Commission on Critical Infrastructure Protection CCEB (Common Criteria Editorial Board), Common Criteria for Information Technology Security Evaluation, Version 2.0 (May 1998)
DOD (U.S. Department of Defense), Trusted Computer System Evaluation Criteria, DOD5200.28-STD, December 1985. 1.0, December 1992
ISO/IEC, Guide 65—General Requirements for Bodies Operating Product Certification Systems (1996)
Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–10 (September 1991)
Boehm, B.: Software Risk Management. IEEE Computer Society Press, Los Alamitos (1989)
Boehm, B., Egyed, A., Kwan, J., Madachy, R.: Developing Multimedia Applications with the WinWin Spiral Model. In: Jazayeri, M. (ed.) ESEC 1997 and ESEC-FSE 1997. LNCS, vol. 1301, pp. 20–39. Springer, Heidelberg (1997)
Boehm, B., Bose, P.: A Collaborative Spiral Process Model Based on Theory W. In: Proceedings, ICSP3, IEEE Computer Society Press, Los Alamitos (1994)
Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (August 2006)
Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (2006)
Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. In: Intelligent Control and Automation. LNCIS, vol. 344, Springer, Heidelberg (August 2006)
Lee, E.-s., Lee, S.-H.: Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 555–564. Springer, Heidelberg (2006)
Pressman, R.S.: Software Engineering. McGraw-Hill, New York (1997)
Cho, N.-d., Lee, E.-s.: Design and implementation of semantic web search system using ontology and anchor text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 546–554. Springer, Heidelberg (2006)
Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, ES., Bae, JM. (2007). Design Agent for the Reliable Web Security Requirement Control. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2007. Lecture Notes in Computer Science(), vol 4496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72830-6_80
Download citation
DOI: https://doi.org/10.1007/978-3-540-72830-6_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72829-0
Online ISBN: 978-3-540-72830-6
eBook Packages: Computer ScienceComputer Science (R0)