Guillermo Horacio Ramirez Caceres
Soka University of America
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Hotspot
Dive into the research topics where Guillermo Horacio Ramirez Caceres is active.
Publication
Featured researches published by Guillermo Horacio Ramirez Caceres.
Information Management & Computer Security | 2010
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
Purpose – The level of security of home information systems can be described as their capacity to resist all the accidental or deliberate malicious activities based on the evaluation assurance levels (EAL) as defined in international standards. The purpose of this paper is to propose a security guideline tool for home users based on the implementation of a protection profile (PP) for home user systems.Design/methodology/approach – The application was developed in three basic steps. First, a PP for home user systems was created on the basis of the international standard ISO/IEC 15408. Then, the paper created a knowledge base including the PP information, as well as a security policy including other international standards, as mentioned above. Finally, the paper created a web application tool to be used as a security guideline for home users.Findings – This tool is developed in order to support users to understand the threats which affect their environment and select the appropriate security policy. By usin...
asia pacific network operations and management symposium | 2008
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
In this paper, we propose a web application for security policy management by using threats-countermeasure model based on international standards. The main objective of this research is to create a knowledge-base to identify and specify the threats that affect the IT environment. In addition, our proposed knowledge-base system intends to fuse similar security controls or objectives to create effectively a security guideline for a specific IT environment. This web application display a detail of the most common threats to the information systems, and for each threat, present a set of related security controls from different international standards including ISO/IEC 27002.
Journal of Information Processing | 2013
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
ISO/IEC TR 19791 is an international standard that must be used as the basis for the security evaluation of operational systems. This standard has been recently developed, and the first version was made available in May 2006. ISO/IEC TR 19791 is intended to be an extension of ISO/IEC 15408, known as “Common Criteria” (CC). In order to evaluate an IT product or system using CC or ISO/IEC TR 19791, developers must create a Security Target (ST), or a System Security Target (SST). However, a problem encountered in creating these is the determination of the Security Problem Definitions (SPDs), because the SPDs fall outside of the scope of CC. Neither ISO/IEC 15408 nor ISO/IEC TR 19791 provides a framework for risk analysis or the specification of threats. In this paper, we propose a threat model based on multiple international standards and evaluated ST information, and describe a Web application that can be used for security specifications in the production of STs and SSTs which are to be evaluated by CC and ISO/IEC TR 19791, respectively.
asia pacific network operations and management symposium | 2012
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
ISO/IEC TR 19791 is an international standard that must be used as the basis for the security evaluation of operational systems. This standard has been recently developed, and the first version was made available in May 2006. ISO/IEC TR 19791 is intended to be an extension of ISO/IEC 15408, known as “Common Criteria” (CC). In order to evaluate an IT product or system using CC or ISO/IEC TR 19791, developers must create a Security Target (ST), or a System Security Target (SST). However, a problem encountered in creating these is the determination of the Security Problem Definitions (SPDs), because the SPDs fall outside of the scope of CC. Neither ISO/IEC 15408 nor ISO/IEC TR 19791 provides a framework for risk analysis or the specification of threats. In this paper, we propose a threat model based on multiple international standards and evaluated ST information, and describe a Web application that can be used for security specifications in the production of STs and SSTs which are to be evaluated by CC and ISO/IEC TR 19791, respectively.
電子情報通信学会ソサイエティ大会講演論文集 | 2010
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
電子情報通信学会ソサイエティ大会講演論文集 | 2009
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
Proceedings of the Society Conference of IEICE | 2009
Lee See Goh; Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
電子情報通信学会総合大会講演論文集 | 2008
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
電子情報通信学会ソサイエティ大会講演論文集 | 2008
Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara
internet multimedia systems and applications | 2008
Atsuo Inomata; Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara; Takeshi Okamoto; Eiji Okamoto