Corpus ID: 111894776

System Security Engineering Capability Maturity Model

@article{Huai2003SystemSE,
  title={System Security Engineering Capability Maturity Model},
  author={Luo Huai},
  journal={Journal of Information Engineering University},
  year={2003}
}
  • Luo Huai
  • Published 2003
  • Computer Science
  • Journal of Information Engineering University
This paper simply introduces the basic conception, the domestic application and the development of CMM.SSECMM is further discussed on the basis of the above introduction.Then the conception,contents,and application of SSECMM are described in detail.Finally,the domestic development foreground of CMM and SSECMM is presented. 
Best practices show the way to information security maturity
6th National Conference on Process Establishment, Assessment and Improvement in Information Technology (ImproveIT 2008), Johannesburg, South Africa, 17 - 19 September 2008
Assessment Methodology on Maturity Level of ISMS
TLDR
This methodology could be used effectively to analyze and evaluate the ISMS of various enterprises and is provided to prove its practical values. Expand
A study on information security management system evaluation - assets, threat and vulnerability
TLDR
This paper analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for the three aspects of ISMS—asset, threat, and vulnerability. Expand
Holistic security requirement engineering for electronic commerce
TLDR
This article proposes an approach called ''holistic security requirement engineering'' meant to elicit security requirements according to system-theoretic considerations and will show that security requirements can be defined with the help of investigations in the business environment, workshops with stakeholders and risk analysis. Expand
A CC-based security engineering process evaluation model
TLDR
This work proposes an effective method of integrating two evaluation methods, CC and SSE-CMM, and develops CC-based assurance evaluation model, CC/spl I.bar/SSE- cMM, which presents the specific and realistically operable organizational security process maturity assessment and CC evaluation model. Expand
EVALUATION AND COMPARISON OF COBIT, ITIL AND ISO27K1/2 STANDARDS WITHIN THE FRAMEWORK OF INFORMATION SECURITY
Information, like other economic assets, is a precious asset for an enterprise so it must be properly protected. The basic solution to protect is to provide "information security". To understandExpand
REVIEW ON COMMON CRITERIA AS A SECURE SOFTWARE DEVELOPMENT MODEL
TLDR
In this paper Common Criteria secure software development approach is examined and compared with other well known standards and models. Expand
An Empirical Study of Quality and Cost Based Security Engineering
TLDR
ISEM methodology considering both product assurance and production processes take advantages in terms of quality and cost, and can make up for the current security engineering methodology. Expand
A practical application of CMM to medical security capability
  • P. Williams
  • Computer Science
  • Inf. Manag. Comput. Secur.
  • 2008
TLDR
A practical application, the capability maturity model (CMM), is proposed, to meet the needs of medical information security practice, using the Tactical Information Governance for Security model developed for the medical setting. Expand
Simplifying development of secure software : Aspects and Agile methods
TLDR
This thesis aims at helping to reduce the complexity of building secure software systems by helping to identify and fix security flaws in systems that are difficult to understand and implement. Expand
...
1
2
3
4
5
...