Skip to main content
7
Views
123
Downloads
1
1
1
Reviewed article

A Method of Evaluating Assurance Requirements

How to cite:
Alexandr Potij, Dmitrij Komin, Inna Rebriy
"A Method of Evaluating Assurance Requirements"
Information & Security: An International Journal,
28
no. 1
no. 9
(2012):
108-120.
http://dx.doi.org/10.11610/isij.2809

A Method of Evaluating Assurance Requirements

Source:

Information & Security: An International Journal,
Volume: 28,
Issue1,
p.108-120
(2012)

Abstract:

This paper presents ontological modelling results from the security assurance domain. It examines problems associated with the process of evaluating assurance. Towards this purpose we propose a functional-linguistic approach to the evaluation of security assurance level. The approach is grounded in the ontological modelling of assurance requirements which are liable to evaluation, in the functional modelling of the evaluation process in IDEF0 and IDEF3 notations and in the introduction of linguistic variables to represent qualitative properties. We consider performance requirements on the scope, depth and rigour of the evaluation process and the requirements for objectivity, repeatability, reproducibility, impartiality and comparability of evaluation results. Thus, we propose a method of evaluating assurance requirements that incorporates object-oriented assurance ontological modelling, process-oriented assurance ontological modelling, development of decision criteria, and workflow modelling.

7
Views
123
Downloads
1
1
1
3
Citations
Факультет комп’ютерних інформаційних технологій, Кафедра комп’ютерної інженерії
Комп’ютерна інженерія Кваліфікаційна робота
(2023):