Towards new areas of security engineering

被引:0
作者
Kim, TH
Hong, CH
Kim, MS
机构
来源
ROUGH SETS, FUZZY SETS, DATA MINING, AND GRANULAR COMPUTING, PT 2, PROCEEDINGS | 2005年 / 3642卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, computer systems consist of many components such as servers and clients, protocols, services, and so on. Systems connected to network have become more complex, with research focused on performance and efficiency. While most of the attention in system security has been paid to encryption technology and protocols for securing data transactions, a weakness (security hole) in any component may comprise the whole system. Security engineering is needed for eliminating such holes. This paper outlines some novel challenges of security engineering, as well as their relations to other areas of scientific research.
引用
收藏
页码:568 / 574
页数:7
相关论文
共 10 条
  • [1] Cha B, 2005, LECT NOTES COMPUT SC, V3481, P254
  • [2] *ISO, 21827 ISOIEC
  • [3] *ISO, 1998, 1550425 ISOIEC TR
  • [4] *ISO, 1999, 15408123 ISOIEC
  • [5] KIM HK, 2003, 1 ACIS INT C SERA
  • [6] Kim TH, 2003, LECT NOTES COMPUT SC, V2660, P605
  • [7] KIM TH, 2004, ICCMSE
  • [8] KIM TH, 2003, 6 C SOFTW ENG TECHN
  • [9] Lee W., 2001, REAL TIME DATA MININ
  • [10] SNOUFFER R, 2001, NIST SPECIAL PUBLICA, P800