%0 Conference Proceedings %T A Proposal on Security Case Based on Common Criteria %+ Nagoya University %+ NTT DATA %+ Research Institute of Information Security [Wakayama] %A Yamamoto, Shuichiro %A Kaneko, Tomoko %A Tanaka, Hidehiko %Z Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES) %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st International Conference on Information and Communication Technology (ICT-EurAsia) %C Yogyakarta, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Madhu Sudan %Y Demetri Terzopoulos %Y Doug Tygar %Y Moshe Y. Vardi %Y Gerhard Weikum %Y Khabib Mustofa %Y Erich J. Neuhold %Y A Min Tjoa %Y Edgar Weippl %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %Y Bernhard Steffen %I Springer %3 Information and Communicatiaon Technology %V LNCS-7804 %P 331-336 %8 2013-03-25 %D 2013 %R 10.1007/978-3-642-36818-9_36 %K Security Case %K Security Requirements Analysis %K Common Criteria %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X It is important to assure the security of systems in the course of development. However, lack of requirements analysis method to integrate security functional requirements analysis and validation in upper process often gives a crucial influence to the system dependability. For security requirements, even if extraction of menaces was completely carried out, insufficient countermeasures do not satisfy the security requirements of customers.In this paper, we propose a method to describe security cases based on the security structures and threat analysis. The security structure of the method is decomposed by the Common Criteria (ISO/IEC15408). %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01480190/document %2 https://inria.hal.science/hal-01480190/file/978-3-642-36818-9_36_Chapter.pdf %L hal-01480190 %U https://inria.hal.science/hal-01480190 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-7804