계층분석기법을 활용한 전장관리정보체계 소프트웨어 시큐어 코딩룰 선정 평가 방안

Translated title of the contribution: Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection

Research output: Contribution to journalArticlepeer-review

Abstract

In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.
Translated title of the contributionEvaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection
Original languageKorean
Pages (from-to)651-662
Number of pages12
Journal한국통신학회논문지C
Volume38
Issue number8
DOIs
StatePublished - Aug 2013

Fingerprint

Dive into the research topics of 'Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection'. Together they form a unique fingerprint.

Cite this