Loading…

Survey and Analysis on Security Control Schemes for Operational System Evaluation

In developed countries, there are many concerns for security management by development of Information security system. And there is evaluate information security product or system for safe management. Therefore, some each advanced countries are achieving information security activity, and evaluate C...

Full description

Saved in:
Bibliographic Details
Main Authors: Kab-Seung Kou, Seung-Yong Hur, Gang-Soo Lee
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In developed countries, there are many concerns for security management by development of Information security system. And there is evaluate information security product or system for safe management. Therefore, some each advanced countries are achieving information security activity, and evaluate CMVP (cryptographic module validation program), CC (common criteria) and ISMS (information security management system). And evaluation activity for operating system evaluation do that all. Also operational systems are lots of schemes for operational system assurance actability. And we see duplication and inefficiency about various information assurance schemes for operational system. Thus, we need survey and analysis on security control schemes in information assurance criteria for operational system evaluation.
DOI:10.1109/ICHIT.2008.257