A Study on Configuration Management Methodology for Information Security Product based on Process Model


KIPS Transactions on Software and Data Engineering, Vol. 11, No. 4, pp. 917-928, Apr. 2004
10.3745/KIPSTD.2004.11.4.917, Full Text:

Abstract

Common Criteria as ISO/IEC 15408 is used to assure and evaluate IT system security. As the prime class of security assurance requirement, CM Configuration Management needs the more principled quality activities and practices for developer must be supported. So in this paper, we propose the well-defined CM method as guideline for TOE developer based on process model including common criteria and develop the CMPET a quantitative process evaluating tool for CM using checklist. It can support useful process analyzing data to developer, evaluator and user.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. M. Hwang, "A Study on Configuration Management Methodology for Information Security Product based on Process Model," KIPS Journal D (2001 ~ 2012) , vol. 11, no. 4, pp. 917-928, 2004. DOI: 10.3745/KIPSTD.2004.11.4.917.

[ACM Style]
Sun Myung Hwang. 2004. A Study on Configuration Management Methodology for Information Security Product based on Process Model. KIPS Journal D (2001 ~ 2012) , 11, 4, (2004), 917-928. DOI: 10.3745/KIPSTD.2004.11.4.917.