메뉴 건너뛰기




Volumn , Issue , 2000, Pages 151-162

Multilateral security a concept and examples for balanced security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER PRIVACY; COMPUTER SIMULATION; GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS; HUMAN ENGINEERING; MANAGEMENT INFORMATION SYSTEMS;

EID: 0034593280     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/366173.366208     Document Type: Conference Paper
Times cited : (57)

References (27)
  • 2
    • 85029644174 scopus 로고    scopus 로고
    • The emperor's old armor
    • [Blakle 1997] September 17-20, Lake Arrowhead, California, USA; ACM, New York 1997; ISBN 0-89791-944-0
    • [Blakle 1997] Bob Blakley: The Emperor's old armor; pp. 2-16 in Proceedings of the 1996 New Security Paradigms Workshop September 17-20, 1996, Lake Arrowhead, California, USA; ACM, New York 1997; ISBN 0-89791-944-0
    • (1996) Proceedings of the 1996 New Security Paradigms Workshop , pp. 2-16
    • Blakley, B.1
  • 3
    • 0013305251 scopus 로고    scopus 로고
    • [Caller ID]
    • [Caller ID] http://www.markwelch.com/callerid.htm
  • 5
    • 84864154896 scopus 로고
    • [CEC 1991] 06-28; Office for Official Publications of the EC
    • [CEC 1991] Commission of the European Communities, (Informal) EC advisory group SOG-IS: IT Security Evaluation Criteria, V. 1.2; 1991-06-28; Office for Official Publications of the EC; also www.itsec.gov.uk/docs/formal.htm#ITSEC
    • (1991) IT Security Evaluation Criteria, V. 1.2
  • 6
    • 0013292294 scopus 로고
    • ITSEC in operation - An evaluation experience
    • [Corbett 1992] May, Ottawa, Canada
    • [Corbett 1992] Chris Corbett: ITSEC in Operation - an Evaluation Experience; pp. 439-460 in Proc. 4th Annual Canadian Computer Security Conference, May 1992, Ottawa, Canada
    • (1992) Proc. 4th Annual Canadian Computer Security Conference , pp. 439-460
    • Corbett, C.1
  • 10
    • 0013254358 scopus 로고    scopus 로고
    • Perösnliche sicherheitsmanager in der virtuellen welt
    • [GaGrPS 1997] Günter Möller und Andreas Pfitzmann (Hrsg.) Bonn u.a
    • [GaGrPS 1997] Gunther Gattung, Rüdiger Grimm, Ulrich Pordesch, Michael J Schneider: Perösnliche Sicherheitsmanager in der virtuellen Welt; S. 181-205 in: Günter Möller und Andreas Pfitzmann (Hrsg.): Mehrseitige Sicherheit in der Kommunikationstechnik, Bonn u.a. 1997
    • (1997) Mehrseitige Sicherheit in der Kommunikationstechnik , pp. 181-205
    • Gattung, G.1    Grimm, R.2    Pordesch, U.3    Schneider, M.J.4
  • 11
    • 12244293216 scopus 로고    scopus 로고
    • [ISO/IEC 1999] International Standard 15408; 12-01
    • [ISO/IEC 1999] Evaluation Criteria for IT Security (ECITS), Parts 1-3; International Standard 15408; 1999-12-01; http://isotc.iso.ch/livelink/livelink/fetch/2000/2489/Ittf_Home/ITTF.htm
    • (1999) Evaluation Criteria for IT Security (ECITS), Parts 1-3
  • 12
    • 84958759310 scopus 로고    scopus 로고
    • A subjective metric of authentication
    • th European Symposium on Research in Computer Security; September 16-18, 1998, Louvain-la-Neuve, Belgium; Springer, Berlin et al.; ISBN 3-540-65004-0
    • th European Symposium on Research in Computer Security; September 16-18, 1998, Louvain-la-Neuve, Belgium; Lecture Notes in Computer Science 1485; Springer, Berlin et al.; ISBN 3-540-65004-0
    • Lecture Notes in Computer Science , vol.1485 , pp. 329-344
    • Jøsang, A.1
  • 14
    • 0013305253 scopus 로고    scopus 로고
    • [MülRan 1999] (eds.) Addison-Wesley-Longman; München et al.; ISBN-3-8273-1360-0
    • [MülRan 1999] Günter Müller, Kai Rannenberg (eds.): Multilateral Security in Communications; Addison-Wesley-Longman; München et al. 1999; ISBN-3-8273-1360-0
    • (1999) Multilateral Security in Communications
    • Müller, G.1    Rannenberg, K.2
  • 15
    • 0013303170 scopus 로고    scopus 로고
    • Negotiating security among end users: Concept and test in a simulation study
    • [Pordes 1998], 30
    • [Pordes 1998] Ulrich Pordesch: Negotiating security among end users: concept and test in a simulation study, Computer Networks and ISDN-Systems 30/1998, pp. 1597
    • (1998) Computer Networks and ISDN-Systems , pp. 1597
    • Pordesch, U.1
  • 17
    • 0033489645 scopus 로고    scopus 로고
    • Optimistic security: A new access control paradigm
    • [Povey 2000] September 22-24, Caledon Hills, Ontario, Canada; ACM, New York 2000; ISBN 1-58113-149-6
    • [Povey 2000] Dean Povey: Optimistic Security: A New Access Control Paradigm; pp. 40-45 in Proceedings of the 1999 New Security Paradigms Workshop September 22-24, 1999, Caledon Hills, Ontario, Canada; ACM, New York 2000; ISBN 1-58113-149-6
    • (1999) Proceedings of the 1999 New Security Paradigms Workshop , pp. 40-45
    • Povey, D.1
  • 18
    • 0027929095 scopus 로고
    • Recent development in information technology security evaluation - The need for evaluation criteria for multilateral security
    • [Rannen 1994] Richard Sizer et al.: August 12-17, onboard M/S Ilich and ashore at St. Petersburg, Russia; IFIP Transactions A-43; North-Holland, Amsterdam et al.; ISBN 0-444-81831-6
    • [Rannen 1994] Kai Rannenberg: Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for multilateral Security; pp. 113-128 in Richard Sizer et al.: Security and Control of Information Technology in Society - Proceedings of the IFIP TC9/WG 9.6 Working Conference August 12-17, 1993, onboard M/S Ilich and ashore at St. Petersburg, Russia; IFIP Transactions A-43; North-Holland, Amsterdam et al. 1994; ISBN 0-444-81831-6
    • (1993) Security and Control of Information Technology in Society - Proceedings of the IFIP TC9/WG 9.6 Working Conference , pp. 113-128
    • Rannenberg, K.1
  • 20
    • 84944062148 scopus 로고    scopus 로고
    • How much negotiation and detail can users handle?
    • th European Symposium on Research in Computer Security; October 4-6, Toulouse, France; Springer, Berlin et al.; ISBN 3-540-41031-7
    • th European Symposium on Research in Computer Security; October 4-6, 2000, Toulouse, France; Lecture Notes in Computer Science 1895; Springer, Berlin et al.; ISBN 3-540-41031-7
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 37-54
    • Rannenberg, K.1
  • 21
    • 0343498102 scopus 로고    scopus 로고
    • Individual management of personal reachability in mobile communication
    • [ReDaFR 1997] Louise Yngström, Jan Carlsen: Information Security in Research and Business; 14-16 May, Copenhagen, Denmark; Chapman & Hall, London; ISBN 0-412-8178-02
    • [ReDaFR 1997] Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg: Individual Management of Personal Reachability in Mobile Communication; pp. 163-174 in Louise Yngström, Jan Carlsen: Information Security in Research and Business; Proceedings of the IFIP TC11 13th International Information Security Conference (SEC '97): 14-16 May 1997, Copenhagen, Denmark; Chapman & Hall, London; ISBN 0-412-8178-02
    • (1997) Proceedings of the IFIP TC11 13th International Information Security Conference (SEC'97) , pp. 163-174
    • Reichenbach, M.1    Damker, H.2    Federrath, H.3    Rannenberg, K.4
  • 25
    • 0013240880 scopus 로고    scopus 로고
    • World wide web consortium: P3P guiding principles
    • [W3C 1998] 21-July
    • [W3C 1998] World Wide Web Consortium: P3P Guiding Principles; W3C NOTE 21-July-1998; www.w3.org/TR/1998/NOTE-P3P10-principles
    • (1998) W3C Note
  • 26
    • 0013295457 scopus 로고    scopus 로고
    • World wide web consortium: The platform for privacy preferences 1.0 (P3P 1.0) specification
    • [W3C 2000] 11 February
    • [W3C 2000] World Wide Web Consortium: The Platform for Privacy Preferences 1.0 (P3P 1.0) Specification; W3C Working Draft 11 February 2000; www.w3.org/P3P/
    • (2000) W3C Working Draft


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.