메뉴 건너뛰기




Volumn 16, Issue 2, 1997, Pages 145-164

Information security embedded in the design of telematics systems

Author keywords

Design model; Problem solving; Requirements; System design; Telematics systems

Indexed keywords

FILE ORGANIZATION; MATHEMATICAL MODELS; PROBLEM SOLVING; SYSTEMS ANALYSIS;

EID: 0030706923     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/s0167-4048(97)00003-5     Document Type: Article
Times cited : (11)

References (28)
  • 1
    • 0346946549 scopus 로고
    • Critical connections: Communications for the future
    • Office of Technology Assessment
    • Critical connections: communications for the future. OTA-CIT-407, OTA-U.S. Congress, Office of Technology Assessment, 1990.
    • (1990) OTA-CIT-407, OTA-U.S. Congress
  • 2
    • 0346946586 scopus 로고
    • Nederlands Genootschap voor Informatici/Kluwer, Deventer, (in Dutch)
    • Informatiebeveiliging: state of the art. Nederlands Genootschap voor Informatici/Kluwer, Deventer, 1993 (in Dutch).
    • (1993) Informatiebeveiliging: State of the Art
  • 3
    • 0009708727 scopus 로고
    • Integrating security activities into the software development lifecycle and the software Quality assurance process
    • F. G. Tompkins and R. Rice, Integrating security activities into the software development lifecycle and the software Quality assurance process, Computers & Security, 5 (1986) 218-242.
    • (1986) Computers & Security , vol.5 , pp. 218-242
    • Tompkins, F.G.1    Rice, R.2
  • 4
    • 0346946551 scopus 로고
    • Developing policies, procedures and information security systems
    • eds J. H. P. Eloff and S. H. von Solms. Chapman & Hall, London
    • Warman, A. R., Developing policies, procedures and information security systems. In Information Security - The Next Decade: Proceedings of IFIP Information Security 1995, eds J. H. P. Eloff and S. H. von Solms. Chapman & Hall, London, 1995, pp. 465-476.
    • (1995) Information Security - The next Decade: Proceedings of IFIP Information Security 1995 , pp. 465-476
    • Warman, A.R.1
  • 6
    • 0028484728 scopus 로고
    • Security architecture for ODP systems, final results of the CEC COST-11 Ter "Security" project
    • S. Muftic, Security architecture for ODP systems, final results of the CEC COST-11 Ter "Security" project, Computer Networks and ISDN Systems, 26 (1994) 1343-1349.
    • (1994) Computer Networks and ISDN Systems , vol.26 , pp. 1343-1349
    • Muftic, S.1
  • 8
    • 0028757699 scopus 로고
    • A methodology to include computer security, safety and resilience requirements as part of the user requirement
    • D. N. J. Mostert and S. H. von Solms, A methodology to include computer security, safety and resilience requirements as part of the user requirement, Computers & Security, 13(4) (1994) 349-364.
    • (1994) Computers & Security , vol.13 , Issue.4 , pp. 349-364
    • Mostert, D.N.J.1    Von Solms, S.H.2
  • 9
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Mitre Corporation, Bedford, MA
    • Bell, D. E. and LaPadula, L. J., Secure computer systems: unified exposition and multics interpretation. Technical report, MTR-2997, Mitre Corporation, Bedford, MA, 1976.
    • (1976) Technical Report, MTR-2997
    • Bell, D.E.1    LaPadula, L.J.2
  • 18
    • 0024717026 scopus 로고
    • Framework of a methodology for the lifecycle of computer security in an organisation
    • K. P. Badenhorst and J. H. P. Eloff, Framework of a methodology for the lifecycle of computer security in an organisation, Computers & Security, 8 (1989) 5.
    • (1989) Computers & Security , vol.8 , pp. 5
    • Badenhorst, K.P.1    Eloff, J.H.P.2
  • 19
    • 0011432676 scopus 로고
    • Deficiencies of the traditional approach to information security and the requirements for a new methodology
    • J. Hitchings, Deficiencies of the traditional approach to information security and the requirements for a new methodology, Computers & Security, 14 (1995) 377-383.
    • (1995) Computers & Security , vol.14 , pp. 377-383
    • Hitchings, J.1
  • 22
    • 0026938531 scopus 로고
    • The art of systems architecting
    • October
    • Rechtin, E. F., The art of systems architecting. IEEE Spectrum, 1992, October, pp. 66-69.
    • (1992) IEEE Spectrum , pp. 66-69
    • Rechtin, E.F.1
  • 25
    • 0347577436 scopus 로고
    • European Computer Manufactors Association (ECMA), TR/46, July
    • Security in open systems, a security framework. European Computer Manufactors Association (ECMA), TR/46, July 1988.
    • (1988) Security in Open Systems, a Security Framework
  • 26
    • 0346946550 scopus 로고
    • Syteemontwikkeling: Vrijheid in gebondenheid
    • A. A. Vreven, Syteemontwikkeling: vrijheid in gebondenheid, Informatie, 36 (1994) 589-597.
    • (1994) Informatie , vol.36 , pp. 589-597
    • Vreven, A.A.1
  • 28
    • 0029253405 scopus 로고
    • Specifications and validation of a security policy model
    • A. Boswell, Specifications and validation of a security policy model, IEEE Transactions on Software Engineering, 21(2) (1995) 63-68.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.2 , pp. 63-68
    • Boswell, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.