Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: 7, In: International Journal of Information Security and Privacy (IJISP), 7 (3), pp. 16-35. DOI: 10.4018/jisp.2013070102,
[Article]
Abstract
<span style="color: rgb(51, 51, 51); font-family: Arial, Verdana, Helvetica, sans-serif; line-height: 17.1429px; ">Common Criteria and ISO 27001/IT-Grundschutz are well acknowledged evaluation standards for the security of IT systems and the organisation they are embedded in. These standards take a technical point of view. In legally sensitive areas, such as processing of personal information or online voting, compliance with the legal specifications is of high importance, however, for the users’ trust in an IT system and thus for the success of this system. This article shows how standards for the evaluation of IT security may be integrated with the KORA approach for law compatible technology design to the benefit of both – increasing confidence IT systems and their conformity with the law on one hand and a concrete possibility for legal requirements to be integrated into technology design from the start. The soundness of this interdisciplinary work will be presented in an exemplary application to online voting.</span>
Item Type: | Article |
---|---|
Erschienen: | 2013 |
Creators: | Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander |
Title: | Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA |
Language: | English |
Abstract: | <span style="color: rgb(51, 51, 51); font-family: Arial, Verdana, Helvetica, sans-serif; line-height: 17.1429px; ">Common Criteria and ISO 27001/IT-Grundschutz are well acknowledged evaluation standards for the security of IT systems and the organisation they are embedded in. These standards take a technical point of view. In legally sensitive areas, such as processing of personal information or online voting, compliance with the legal specifications is of high importance, however, for the users’ trust in an IT system and thus for the success of this system. This article shows how standards for the evaluation of IT security may be integrated with the KORA approach for law compatible technology design to the benefit of both – increasing confidence IT systems and their conformity with the law on one hand and a concrete possibility for legal requirements to be integrated into technology design from the start. The soundness of this interdisciplinary work will be presented in an exemplary application to online voting.</span> |
Journal or Publication Title: | International Journal of Information Security and Privacy (IJISP) |
Series: | 7 |
Volume of the journal: | 7 |
Issue Number: | 3 |
Uncontrolled Keywords: | Security, Usability and Society;Secure Data |
Divisions: | LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt 20 Department of Computer Science > SECUSO - Security, Usability and Society Profile Areas > Cybersecurity (CYSEC) LOEWE > LOEWE-Zentren 20 Department of Computer Science Profile Areas LOEWE |
Event Location: | Hershey, PA, USA |
Date Deposited: | 28 Jul 2016 18:35 |
DOI: | 10.4018/jisp.2013070102 |
Identification Number: | TUD-CS-2013-0213 |
PPN: | |
Corresponding Links: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |