Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guillermo Horacio Ramirez Caceres is active.

Publication


Featured researches published by Guillermo Horacio Ramirez Caceres.


Information Management & Computer Security | 2010

Security guideline tool for home users based on international standards

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara

Purpose – The level of security of home information systems can be described as their capacity to resist all the accidental or deliberate malicious activities based on the evaluation assurance levels (EAL) as defined in international standards. The purpose of this paper is to propose a security guideline tool for home users based on the implementation of a protection profile (PP) for home user systems.Design/methodology/approach – The application was developed in three basic steps. First, a PP for home user systems was created on the basis of the international standard ISO/IEC 15408. Then, the paper created a knowledge base including the PP information, as well as a security policy including other international standards, as mentioned above. Finally, the paper created a web application tool to be used as a security guideline for home users.Findings – This tool is developed in order to support users to understand the threats which affect their environment and select the appropriate security policy. By usin...


asia pacific network operations and management symposium | 2008

A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara

In this paper, we propose a web application for security policy management by using threats-countermeasure model based on international standards. The main objective of this research is to create a knowledge-base to identify and specify the threats that affect the IT environment. In addition, our proposed knowledge-base system intends to fuse similar security controls or objectives to create effectively a security guideline for a specific IT environment. This web application display a detail of the most common threats to the information systems, and for each threat, present a set of related security controls from different international standards including ISO/IEC 27002.


Journal of Information Processing | 2013

A Threat Model for Security Specification in Security Evaluation by ISO/IEC 19791

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara

ISO/IEC TR 19791 is an international standard that must be used as the basis for the security evaluation of operational systems. This standard has been recently developed, and the first version was made available in May 2006. ISO/IEC TR 19791 is intended to be an extension of ISO/IEC 15408, known as “Common Criteria” (CC). In order to evaluate an IT product or system using CC or ISO/IEC TR 19791, developers must create a Security Target (ST), or a System Security Target (SST). However, a problem encountered in creating these is the determination of the Security Problem Definitions (SPDs), because the SPDs fall outside of the scope of CC. Neither ISO/IEC 15408 nor ISO/IEC TR 19791 provides a framework for risk analysis or the specification of threats. In this paper, we propose a threat model based on multiple international standards and evaluated ST information, and describe a Web application that can be used for security specifications in the production of STs and SSTs which are to be evaluated by CC and ISO/IEC TR 19791, respectively.


asia pacific network operations and management symposium | 2012

A threat model for security specification in security evaluation by ISO/IEC 19791

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara

ISO/IEC TR 19791 is an international standard that must be used as the basis for the security evaluation of operational systems. This standard has been recently developed, and the first version was made available in May 2006. ISO/IEC TR 19791 is intended to be an extension of ISO/IEC 15408, known as “Common Criteria” (CC). In order to evaluate an IT product or system using CC or ISO/IEC TR 19791, developers must create a Security Target (ST), or a System Security Target (SST). However, a problem encountered in creating these is the determination of the Security Problem Definitions (SPDs), because the SPDs fall outside of the scope of CC. Neither ISO/IEC 15408 nor ISO/IEC TR 19791 provides a framework for risk analysis or the specification of threats. In this paper, we propose a threat model based on multiple international standards and evaluated ST information, and describe a Web application that can be used for security specifications in the production of STs and SSTs which are to be evaluated by CC and ISO/IEC TR 19791, respectively.


電子情報通信学会ソサイエティ大会講演論文集 | 2010

BS-7-29 A Threat Modeling for Security Specification of Security Evaluation by CC and ISO/IEC 19791(BS-7. Network Planning, Control and Management)

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara


電子情報通信学会ソサイエティ大会講演論文集 | 2009

BS-10-17 Study on a Threat Modeling for Security Specification in Production of Security Targets

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara


Proceedings of the Society Conference of IEICE | 2009

BS-10-19 Study on the information technology security policy implementation in an organization with the contrast of optimum network accessibility

Lee See Goh; Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara


電子情報通信学会総合大会講演論文集 | 2008

BS-3-16 A Proposal of Threat Modeling Based on International Standards(BS-3. Network Management Technologies for Next Generation Network)

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara


電子情報通信学会ソサイエティ大会講演論文集 | 2008

BS-12-22 A Proposal of a Knowledge Based System to Support Acquisition of Security International Standards(BS-12. Network Planning, Control, and Management)

Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara


internet multimedia systems and applications | 2008

Proposal of Cryptography-SLA and its application against the compromise risk of cryptosystems

Atsuo Inomata; Guillermo Horacio Ramirez Caceres; Yoshimi Teshigawara; Takeshi Okamoto; Eiji Okamoto

Collaboration


Dive into the Guillermo Horacio Ramirez Caceres's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Atsuo Inomata

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge