Skip to main content

On the Operational Security Assurance Evaluation of Networked IT Systems

  • Conference paper
Smart Spaces and Next Generation Wired/Wireless Networking (ruSMART 2009, NEW2AN 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5764))

Abstract

In this paper, we introduce and discuss the system security assurance assessment problematic. We first define and position security assurance in the context of modern networked IT systems. We then motivate and discuss its use. Next, we define the problem of the operational security assurance evaluation. We present and compare two orthogonal approaches to such an evaluation: a spec-based approach, which is an extension of the Common Criteria to systems in operation, and a direct approach, which relies on network management. Finally, we show examples and the pros and the cons of both approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CC, Common Criteria for IT Security Evaluation, v3.1 (2006 – 2007)

    Google Scholar 

  2. Herrmann, D., Keith, S.: Application of Common Criteria to Telecomm Services: A Case Study. Computer Security Journal XVII(2), 21–28 (2001)

    Google Scholar 

  3. Hearn, J.: Does the common criteria paradigm have a future? IEEE Security & Privacy 2(1), 64–65 (2004)

    Article  Google Scholar 

  4. Keblawi, F., Sullivan, D.: Applying the common criteria in systems engineering. IEEE Security& Privacy 4(2), 50–55 (2006)

    Article  Google Scholar 

  5. Galitzer, S.: Introducing Engineered Composition (EC): An Approach for Extending the Common Criteria to Better Support Composing Systems. In: Proc. Workshop for Application of Engineering Principles to System Security Design, WAEPSSD (2003)

    Google Scholar 

  6. Pham, N., Riguidel, M.: Security Assurance Aggregation for IT Infrastructures. In: IEEE ICSNC 2007 (2007)

    Google Scholar 

  7. Zuccato, A., Marquet, B., Papillon, S., Alden, M.: Service oriented modeling of communication infrastructure for assurance. In: IEEE Information Assurance Workshop (2006)

    Google Scholar 

  8. Bulut, E., Khadraoui, D., Marquet, B.: Multi-Agent based Security Assurance Monitoring System for Telecommunication Infrastructures. In: Proc. Communication, Network, and Information Security? (2007)

    Google Scholar 

  9. CELTIC Bugyo project, http://projects.celtic-initiative.org/bugyo/

  10. Rossebø, J.E.Y., Cadzow, S., Sijben, P.: eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. In: Stølen, K., et al. (eds.) iTust 2006. LNCS, vol. 3986, pp. 467–471. Springer, Heidelberg (2006)

    Google Scholar 

  11. Riguidel, M., Hecker, A., Simon, V.: Armature for Critical Infrastructures. In: IEEE SMC 2006, Taipei, Taiwan (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hecker, A., Riguidel, M. (2009). On the Operational Security Assurance Evaluation of Networked IT Systems. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds) Smart Spaces and Next Generation Wired/Wireless Networking. ruSMART NEW2AN 2009 2009. Lecture Notes in Computer Science, vol 5764. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04190-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04190-7_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04188-4

  • Online ISBN: 978-3-642-04190-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics