@inproceedings{c43d3f455cd446ee936c1984cd9bc1ed,
title = "Methodology for evaluating information security countermeasures of a system",
abstract = "For leveraging the security level of the systems, it is required to develop an effective and practical methodology for evaluating the adequacy of the designed and/or implemented security countermeasures for a system. We propose a model as a one of the methodologies for evaluating security countermeasures which does not depend on the characteristics of a target system shown by the supporting businesses or the system configuration or the scale. This model consists of required security countermeasures that are well arranged for easy implementing, and required technologies and activities for achieving a target level for every required countermeasures.",
author = "Takaaki Shigematsu and Chou, {Bin Hui} and Yoshiaki Hori and Kouichi Sakurai",
year = "2008",
doi = "10.1109/ISA.2008.92",
language = "English",
isbn = "9780769531267",
series = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",
pages = "433--438",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",
note = "2nd International Conference on Information Security and Assurance, ISA 2008 ; Conference date: 24-04-2008 Through 26-04-2008",
}