Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kab-seung Kou is active.

Publication


Featured researches published by Kab-seung Kou.


international conference on hybrid information technology | 2008

Survey and Analysis on Security Control Schemes for Operational System Evaluation

Kab-seung Kou; Seung-Yong Hur; Gang-soo Lee

In developed countries, there are many concerns for security management by development of Information security system. And there is evaluate information security product or system for safe management. Therefore, some each advanced countries are achieving information security activity, and evaluate CMVP (cryptographic module validation program), CC (common criteria) and ISMS (information security management system). And evaluation activity for operating system evaluation do that all. Also operational systems are lots of schemes for operational system assurance actability. And we see duplication and inefficiency about various information assurance schemes for operational system. Thus, we need survey and analysis on security control schemes in information assurance criteria for operational system evaluation.


international conference on future generation communication and networking | 2008

Modeling and Analysis of CC-Based Security Assurance for Composed Systems

Kab-seung Kou; Gang-soo Lee

The Common Criteria (CC) has been focused on single product that is consisted of one software component. Evaluation modeling of composed product, which is consisted of two or more evaluated or unevaluated component, is needed. In this paper, we survey and classify evaluation criteria for information security system and product in context of CC evaluation scheme. We define 5 types of assurance, and propose composition models. Conventional criteria for composed product are surveyed and analyzed.


international conference on hybrid information technology | 2006

Comparative Study on Information Schema Evaluation

Kab-seung Kou; Sung-il Han; Gang-soo Lee

In these days, many organizations try to manage their information system in safe way due to more rapidly change in information system environment. Appropriate development and evaluation are necessary in order to manage safe information system. The information guarantee of information system is gained through effective and appropriate information security management. In this paper, we survey and analyze for information security system in each criteria


international conference on future generation communication and networking | 2007

Intrusion Tolerance Model for Electronic Commerce System

Young-Soo Kim; Kab-seung Kou; Gang-soo Lee

While security traditionally has been an important issue in information systems, the problem of the greatest concern today is related to the availability of information and continuity of services. Since people and organizations now rely on distributed systems in accessing and processing critical services and mission, the availability of information and continuity of services are becoming more important. Therefore the importance of implementing systems that continue to function in the presence of security breaches cannot be overemphasized. One of the solutions to provide the availability and continuity of information system applications is introducing an intrusion tolerance system. Security mechanism and adaptation mechanism can ensure intrusion tolerance by protecting the application from accidental or malicious changes to the system and by adapting the application to the changing conditions. In this paper we propose an intrusion tolerance model that improves the developmental structure while assuring security level. We also design and implement an adaptive intrusion tolerance system to verify the efficiency of our model by integrating proper functions extracted from CORBA security modules.


international conference on hybrid information technology | 2006

Survey and Analysis on Security Control Schema in Information Assurance Criteria

Sung-il Han; Kab-seung Kou; Gang-soo Lee

In each organization, there are many concerns for security management by development of information system. And organization used information assurance system for safe management. Information assurance is a lot of criteria. And we see duplication and inefficiency about various information assurance criteria. Thus, we need survey and analysis on security control schema in information assurance criteria


한국멀티미디어학회 국제학술대회 | 2008

Evaluation Scope Models for CC Based IT Security Evaluation

Seung-Yong Hur; Kab-seung Kou; Gang-soo Lee


information security and cryptology | 2007

Estimation of relative evaluation effort ratios for each EALs in CC 2.3 and CC 3.1

Kab-seung Kou; Young-Soo Kim; Gang-soo Lee


information security and cryptology | 2009

UML 2.0 Statechart based Modeling and Analysis of Finite State Model for Cryptographic Module Validation

Gang-soo Lee; Jae-Goo Jeong; Kab-seung Kou


한국멀티미디어학회 국제학술대회 | 2008

Development of Security Policy Guidance for the CMVP

Young-Hwan Bang; Ji-Hoon Jang; Kab-seung Kou; Gang-soo Lee


한국멀티미디어학회 국제학술대회 | 2008

Analysis of Protection Profiles for Common Criteria v3.1

Jae-Goo Jeong; Kab-seung Kou; Sung-ha Hwang; Gang-soo Lee

Collaboration


Dive into the Kab-seung Kou's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge