메뉴 건너뛰기




Volumn 22, Issue 4, 2003, Pages 337-360

An integral framework for information systems security management

Author keywords

Information systems; Methodological framework; Security management

Indexed keywords

COMPUTER SOFTWARE MAINTENANCE; ELECTRONIC COMMERCE; INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY; INTERNET; LAWS AND LEGISLATION; ONLINE SYSTEMS; SOCIETIES AND INSTITUTIONS; STANDARDS;

EID: 0038205942     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(03)00413-9     Document Type: Article
Times cited : (55)

References (75)
  • 1
    • 26544478445 scopus 로고    scopus 로고
    • Evaluating the cost of ownership for digital certificate projects
    • Aberdeen Group; Boston: Aberdeen Group
    • Aberdeen Group, 1998. Evaluating the Cost of Ownership for Digital Certificate Projects. Boston: Aberdeen Group.
    • (1998)
  • 2
    • 0003448413 scopus 로고    scopus 로고
    • UML in a nutshell
    • Cambridge: O'Reilly
    • Alhir, S. 1998. UML in a Nutshell. Cambridge: O'Reilly.
    • (1998)
    • Alhir, S.1
  • 5
    • 11244271401 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • ANSI; X9.62 standard. Washington, DC: ANSI
    • ANSI, 1998. The Elliptic Curve Digital Signature Algorithm (ECDSA). X9.62 standard. Washington, DC: ANSI.
    • (1998)
  • 7
    • 85031156937 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Roadmap. PKIX Draft Standard. Reston: IETF
    • Aresenault, A. et al., 2002. Internet X.509 Public Key Infrastructure Roadmap. PKIX Draft Standard. Reston: IETF.
    • (2002)
    • Aresenault, A.1
  • 8
    • 85031150200 scopus 로고    scopus 로고
    • ASC X12; X12 Standard Release 4050. Washington, DC: ANSI
    • ASC X12, 2001. X12 Standard Release 4050. Washington, DC: ANSI.
    • (2001)
  • 9
    • 0038703578 scopus 로고    scopus 로고
    • Global E-commerce law
    • Baker & Mc Kenzie; Chicago: Baker & Mc Kenzie
    • Baker & Mc Kenzie, 2002. Global E-Commerce Law. http://www.bmck.com/ecommerce/intlegis-t.htm Chicago: Baker & Mc Kenzie.
    • (2002)
  • 10
    • 85031160630 scopus 로고
    • Secure Computer Systems: Mathematical Foundations. ESD-TR-73-278. Washington, DC: MITRE Corp.
    • Bell, D., La Padulla, L. 1973. Secure Computer Systems: Mathematical Foundations. ESD-TR-73-278. Washington, DC: MITRE Corp.
    • (1973)
    • Bell, D.1    La Padulla, L.2
  • 11
    • 0038703577 scopus 로고    scopus 로고
    • Risk analysis - The security survey
    • Woburn: Butterworth - Heinemann
    • Broder, J.F. 2000. Risk Analysis - The Security Survey. Woburn: Butterworth - Heinemann.
    • (2000)
    • Broder, J.F.1
  • 12
    • 0009824933 scopus 로고    scopus 로고
    • Code of practice for information security management
    • BSI; British Standard 7799. London: British Standards Institute
    • BSI 1999, Code of practice for information security management. British Standard 7799. London: British Standards Institute.
    • (1999)
  • 15
    • 85031154088 scopus 로고    scopus 로고
    • COBIT Steering Committee; Rolling Meadows: Information Systems Audit and Control Foundation
    • COBIT Steering Committee 1998. Executive Overview (2nd ed.). Rolling Meadows: Information Systems Audit and Control Foundation.
    • (1998) Executive Overview (2nd Ed.)
  • 16
    • 0003735821 scopus 로고
    • Standard for the format of arpa internet text messages
    • RFC 822. Reston: IETF
    • Crocker, D.H. 1982. Standard For The Format Of Arpa Internet Text Messages. RFC 822. Reston: IETF.
    • (1982)
    • Crocker, D.H.1
  • 17
    • 0036920866 scopus 로고    scopus 로고
    • Global trust, certification and (ISC)2
    • DeMaio, H. 2002. Global Trust, Certification and (ISC)2. Computers & Security Vol. 21. No. 8, pp. 701-704.
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 701-704
    • DeMaio, H.1
  • 18
    • 0032715216 scopus 로고    scopus 로고
    • Survival is not compulsory
    • Elsevier
    • Devargas M., 1999. Survival is Not Compulsory. Elsevier, Computers & Security, Vol. 18, No. 1, pp. 35-46.
    • (1999) Computers & Security , vol.18 , Issue.1 , pp. 35-46
    • Devargas, M.1
  • 19
    • 85031151016 scopus 로고
    • Organization of marketing and marketing information system. Organization and information systems
    • Aedermannsdorf: Scitec Publications
    • Devetak, G. 1995. Organization of marketing and marketing information system. Organization and information systems. Aedermannsdorf: Scitec Publications.
    • (1995)
    • Devetak, G.1
  • 20
    • 27544515159 scopus 로고    scopus 로고
    • Electronic interaction in the workplace: Monitoring, retrieving and storing employee communications
    • Age. Publications and Seminars. New York: Morgan & Lewis Counselors
    • Dichter, M.S., Burkhardt, M.S. 2001. Electronic Interaction in the Workplace: Monitoring, Retrieving and Storing Employee Communications. Age. Publications and Seminars. New York: Morgan & Lewis Counselors. http://www.morganlewis.com/art61499.htm.
    • (2001)
    • Dichter, M.S.1    Burkhardt, M.S.2
  • 21
    • 33847753565 scopus 로고    scopus 로고
    • Transport layer security
    • Standard RFC 2246. Reston: IETF
    • Dierks, T., Allen, C. 1999. Transport Layer Security. Standard RFC 2246. Reston: IETF.
    • (1999)
    • Dierks, T.1    Allen, C.2
  • 22
    • 85031147761 scopus 로고    scopus 로고
    • Top 10 things to consider in developing an electronic commerce web site
    • Publications and Seminars. New York: Morgan & Lewis Counselors
    • Dreben, R.N., Werbach, J.L. 1999. Top 10 Things to Consider in Developing an Electronic Commerce Web Site. Publications and Seminars. New York: Morgan & Lewis Counselors. http://www.morganlewis.com/art8999.htm.
    • (1999)
    • Dreben, R.N.1    Werbach, J.L.2
  • 23
    • 1442357062 scopus 로고    scopus 로고
    • Secure hash algorithm - 1
    • RFC 3174 Standard. Reston: IETF
    • Eastlake, D., Jones, P. 2001, Secure Hash Algorithm - 1. RFC 3174 Standard. Reston: IETF.
    • (2001)
    • Eastlake, D.1    Jones, P.2
  • 24
    • 85031146183 scopus 로고    scopus 로고
    • Data protection directive
    • EU; Directive 1998/46/EC; Brussels: November: 1995
    • EU, 1998. Data Protection Directive. Directive 1998/46/EC Official Journal of the European Communities. Brussels: November: 1995.
    • (1998) Official Journal of the European Communities
  • 25
    • 0037689249 scopus 로고    scopus 로고
    • Electronic signature directive
    • EU; Directive 1999/93/EC, Official Journal of the European Communities. Brussels: December 1999
    • EU, 1999. Electronic Signature Directive. Directive 1999/93/EC, Official Journal of the European Communities. Brussels: December 1999.
    • (1999)
  • 26
    • 84855627847 scopus 로고    scopus 로고
    • Directive on electronic commerce
    • EU; Directive 2000/31/EC, Official Journal of the European Communities. Brussels: June 2000
    • EU, 2000. Directive on Electronic Commerce. Directive 2000/31/EC, Official Journal of the European Communities. Brussels: June 2000.
    • (2000)
  • 27
    • 26544472850 scopus 로고    scopus 로고
    • Directive on privacy and electronic communications
    • EU; Directive 2002/58/EC, Official Journal of the European Communities. Brussels: July 2002
    • EU, 2001. Directive on Privacy and Electronic Communications. 2001. Directive 2002/58/EC, Official Journal of the European Communities. Brussels: July 2002.
    • (2001)
  • 28
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption standard
    • Foti, J. (Ed.); FIPS Draft. Washington, DC: DoC
    • Foti, J. (Ed.) 2001. Advanced Encryption Standard. FIPS Draft. Washington, DC: DoC.
    • (2001)
  • 29
    • 0038027163 scopus 로고    scopus 로고
    • FIPA security SIG request for information
    • Foundation for Intelligent Physical Agents; F-OUT-00065 Deliverable. Concord: FIPA
    • Foundation for Intelligent Physical Agents (2001). FIPA Security SIG Request For Information. F-OUT-00065 Deliverable. Concord: FIPA.
    • (2001)
  • 30
    • 0008626109 scopus 로고    scopus 로고
    • Multipurpose internet mail extensions
    • RFC 2045 Standard. Reston: IETF
    • Freed, N. 1996. Multipurpose Internet Mail Extensions. RFC 2045 Standard. Reston: IETF.
    • (1996)
    • Freed, N.1
  • 32
    • 0038365280 scopus 로고    scopus 로고
    • From common criteria to elliptic curves - ISO/IEC JTC 1/SC 27, IT security techniques
    • Fumy, W., 2000. From Common Criteria to Elliptic Curves - ISO/IEC JTC 1/SC 27, IT Security Techniques. ISO Bulletin, No. 6, pp. 20-25.
    • (2000) ISO Bulletin , Issue.6 , pp. 20-25
    • Fumy, W.1
  • 34
    • 85031148040 scopus 로고    scopus 로고
    • Group on the Next Generation Internet Policy; e-Japan Initiative Tokyo: GNGIP
    • Group on the Next Generation Internet Policy, 2000. e-Japan Initiative Tokyo: GNGIP.
    • (2000)
  • 35
    • 0036684150 scopus 로고    scopus 로고
    • PKI: It's not dead, just resting
    • Gutmann, P., 2002. PKI: It's Not Dead, Just Resting. IEEE Computer, Vol. 35, No. 8, pp. 41-49.
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 41-49
    • Gutmann, P.1
  • 36
    • 0038027166 scopus 로고    scopus 로고
    • Developing E-business systems and architectures
    • San Francisco: Morgan Kaufman
    • Harmon, P., 2001. Developing E-Business Systems and Architectures. San Francisco: Morgan Kaufman.
    • (2001)
    • Harmon, P.1
  • 37
    • 0003724870 scopus 로고    scopus 로고
    • Smart card security and application
    • London: Artech House
    • Hendry, M., 1997. Smart Card Security and Application. London: Artech House.
    • (1997)
    • Hendry, M.1
  • 38
    • 0003406298 scopus 로고
    • Design and validation of computer protocols
    • London: Prentice Hall
    • Holzmann, J.G., 1991. Design and validation of computer protocols. London: Prentice Hall.
    • (1991)
    • Holzmann, J.G.1
  • 39
    • 0036918639 scopus 로고    scopus 로고
    • Policy challenges in building dependability in global infrastructures
    • Hunker, J., 2002. Policy challenges in building dependability in global infrastructures. Elsevier Science, Computers & Security, Vol. 21, No. 8, pp. 705-710.
    • (2002) Elsevier Science, Computers & Security , vol.21 , Issue.8 , pp. 705-710
    • Hunker, J.1
  • 40
    • 85031157765 scopus 로고
    • ISO; IT - Identification Cards. IS 7816 / 1thru 10. Geneva: ISO
    • ISO, 1994. IT - Identification Cards. IS 7816 / 1thru 10. Geneva: ISO.
    • (1994)
  • 41
    • 85031152875 scopus 로고
    • ISO; IT, OSI: Security Frameworks in Open Systems. IS 10181 / 1 thru 7. Geneva: ISO
    • ISO, 1995a. IT, OSI: Security Frameworks in Open Systems. IS 10181 / 1 thru 7. Geneva: ISO.
    • (1995)
  • 42
    • 85031159487 scopus 로고
    • ISO; Quality Systems. Standards ISO 9001 thru 9003. Geneva: ISO
    • ISO, 1995b. Quality Systems. Standards ISO 9001 thru 9003. Geneva: ISO.
    • (1995)
  • 43
    • 0038703566 scopus 로고    scopus 로고
    • Quality management and quality system elements
    • ISO; Standards ISO 9004 / 1 thru 2. Geneva: ISO
    • ISO, 1997. Quality Management and Quality System Elements. Standards ISO 9004 / 1 thru 2. Geneva: ISO.
    • (1997)
  • 44
    • 85031147881 scopus 로고    scopus 로고
    • Common criteria, security techniques - Evaluation criteria for IT security
    • ISO; IS 15408, parts 1 thru 3. Geneva: ISO
    • ISO, 1999. Common Criteria, Security techniques - Evaluation criteria for IT security. IS 15408, parts 1 thru 3. Geneva: ISO.
    • (1999)
  • 45
    • 85031154269 scopus 로고    scopus 로고
    • ISO; Code of practice for inf. sec. management. ISO 17799 Standard. Geneva: ISO
    • ISO, 2000. Code of practice for inf. sec. management. ISO 17799 Standard. Geneva: ISO.
    • (2000)
  • 46
    • 85031154159 scopus 로고    scopus 로고
    • ISO; Z formal specification notation. FDIS 13568. Geneva: ISO
    • ISO, 2002. Z formal specification notation. FDIS 13568. Geneva: ISO.
    • (2002)
  • 47
    • 85031158465 scopus 로고    scopus 로고
    • IT - Open systems interconnection - The directory: Overview of concepts, models and services
    • ITU-T; Recommendation X.500. Geneva: ISO
    • ITU-T, 1997c. IT - Open Systems Interconnection - The Directory: Overview of concepts, models and services. Recommendation X.500. Geneva: ISO.
    • (1997)
  • 48
    • 4244000104 scopus 로고    scopus 로고
    • Public-key and attribute certificate frameworks
    • ITU-T; X.509 Standard. Geneva: ISO
    • ITU-T, 2000. Public-key and attribute certificate frameworks. X.509 Standard. Geneva: ISO.
    • (2000)
  • 49
    • 0003482564 scopus 로고    scopus 로고
    • Information hiding techniques for steganography and digital watermarking
    • London: Artech House
    • Katzenbeisser, S., Petitcolas, F.A.P., 1999. Information hiding techniques for steganography and digital watermarking. London: Artech House.
    • (1999)
    • Katzenbeisser, S.1    Petitcolas, F.A.P.2
  • 50
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Kemmerer, R.A., Vigna, G., 2002. Intrusion Detection: A Brief History and Overview. IEEE Computer, Security & Privacy, Vol. 35, No. 5, pp. 27-30.
    • (2002) IEEE Computer, Security & Privacy , vol.35 , Issue.5 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 51
    • 0004347791 scopus 로고    scopus 로고
    • Differential power analysis, white paper
    • San Francisco: Cryptography Research Inc.
    • Kocher, P., Jaffe, J., Jun, B., 2000. Differential Power Analysis, White paper. San Francisco: Cryptography Research Inc.
    • (2000)
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 52
    • 4243719783 scopus 로고    scopus 로고
    • Crypto law survey
    • Koops, B.J., 2001. Crypto Law Survey. http://rechten.kub.nl/koops/cryptolaw.
    • (2001)
    • Koops, B.J.1
  • 53
    • 85031148055 scopus 로고    scopus 로고
    • Enabling XML security
    • New York: IBM
    • Mactaggart M., 2001. Enabling XML security. http://www-106.ibm.com/developerworks/xm. New York: IBM.
    • (2001)
    • Mactaggart, M.1
  • 54
    • 85031158004 scopus 로고    scopus 로고
    • Inoviranje, Koper: College of Management
    • Likar, B., 2001. Inoviranje, Koper: College of Management.
    • (2001)
    • Likar, B.1
  • 55
    • 0035395659 scopus 로고    scopus 로고
    • Facing the challenge of wireless security
    • Miller, S.K., 2001. Facing the Challenge of Wireless Security. IEEE Computer, Vol. 35, No. 7, pp. 16-18.
    • (2001) IEEE Computer , vol.35 , Issue.7 , pp. 16-18
    • Miller, S.K.1
  • 56
    • 0005456577 scopus 로고    scopus 로고
    • Guidelines for Cryptography Policy
    • OECD; Paris: OECD
    • OECD, 1997. Guidelines for Cryptography Policy. Paris: OECD.
    • (1997)
  • 57
    • 85031146732 scopus 로고    scopus 로고
    • Implementing the OECD "Privacy guidelines" In the electronic environment: Focus on the internet
    • OECD; Paris: OECD
    • OECD, 1998. Implementing The OECD "Privacy Guidelines" In The Electronic Environment: Focus On The Internet. Paris: OECD.
    • (1998)
  • 59
    • 84892780300 scopus 로고    scopus 로고
    • The internet legal guide: Everything you need to know when doing business online
    • New York: John Wiley & Sons
    • Powers, D.M. 2001. The Internet Legal Guide: Everything you need to know when doing business online. New York: John Wiley & Sons.
    • (2001)
    • Powers, D.M.1
  • 60
    • 84876166635 scopus 로고    scopus 로고
    • Sicherheitskonzepte fuer das Internet
    • Heidelberg: dpunkt-Verlag
    • Raepple, M., 2001. Sicherheitskonzepte fuer das Internet. Heidelberg: dpunkt-Verlag.
    • (2001)
    • Raepple, M.1
  • 61
    • 1842643238 scopus 로고    scopus 로고
    • S/MIME message specification
    • Standard RFC 2633. Reston: IETF
    • Ramsdell, B., 1999. S/MIME Message Specification. Standard RFC 2633. Reston: IETF.
    • (1999)
    • Ramsdell, B.1
  • 62
    • 85031146415 scopus 로고
    • CA Requirements. PASSWORD Project R. 2.5 document. Cambridge: Cambridge University
    • Roe, M., 1993. CA Requirements. PASSWORD Project R. 2.5 document. Cambridge: Cambridge University.
    • (1993)
    • Roe, M.1
  • 64
    • 0003441355 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Mobile Agent Security, LNCS 1419. Heidelberg: Springer Verlag
    • Sander, T., Tschudin, C.F., 1998. Protecting Mobile Agents Against Malicious Hosts. Mobile Agent Security, LNCS 1419. Heidelberg: Springer Verlag.
    • (1998)
    • Sander, T.1    Tschudin, C.F.2
  • 65
    • 0003855464 scopus 로고    scopus 로고
    • Applied cryptography
    • New York: John Willey & Sons
    • Schneier, B., 1996. Applied Cryptography. New York: John Willey & Sons.
    • (1996)
    • Schneier, B.1
  • 66
    • 0003902428 scopus 로고    scopus 로고
    • Cryptography and network security
    • London: Prentice Hall
    • Stallings, W., 1999. Cryptography and Network Security. London: Prentice Hall.
    • (1999)
    • Stallings, W.1
  • 68
    • 0005915973 scopus 로고    scopus 로고
    • IP security document roadmap
    • RFC 2411. Reston: IETF
    • Thayer, R., et al., 1998. IP Security Document Roadmap. RFC 2411. Reston: IETF.
    • (1998)
    • Thayer, R.1
  • 69
    • 0035118271 scopus 로고    scopus 로고
    • Slovene smart card and IP based health-care information system infrastructure
    • Amsterdam: Elsevier
    • Trček, D. et al., 2001. Slovene smart card and IP based health-care information system infrastructure. International journal of medical informatics. Vol. 61 pp. 33-43. Amsterdam: Elsevier.
    • (2001) International Journal of Medical Informatics , vol.61 , pp. 33-43
    • Trček, D.1
  • 70
    • 0037689235 scopus 로고
    • Electronic data interchange for administration, commerce and transport - Syntax rules
    • UN Economic Commission for Europe; ISO 9735. Geneva: ISO
    • UN Economic Commission for Europe. 1993. Electronic Data Interchange for Administration, Commerce and Transport - Syntax Rules. ISO 9735. Geneva: ISO.
    • (1993)
  • 71
    • 0038365269 scopus 로고    scopus 로고
    • Model law on electronic commerce
    • UNCITRAL; Vienna: UNCITRAL
    • UNCITRAL, 1996. Model Law on Electronic Commerce. http://www.uncitral.org/english/texts/elect-com/ecommerceindex.htm. Vienna: UNCITRAL.
    • (1996)
  • 72
    • 4243838611 scopus 로고    scopus 로고
    • Model law on digital signatures
    • UNCITRAL; Vienna: UNCITRAL
    • UNCITRAL, 2001. Model Law on Digital Signatures. http://www.uncitral.org/english/texts/elect-com/ecommerceindex.htm. Vienna: UNCITRAL.
    • (2001)
  • 73
    • 85031152065 scopus 로고    scopus 로고
    • US Congress; Digital Millennium Copyright Act. H.R. 2281, Public Law 105-304. Washington D.C.: January 1998
    • US Congress, 1998. Digital Millennium Copyright Act. H.R. 2281, Public Law 105-304. Washington D.C.: January 1998.
    • (1998)
  • 74
    • 0038365275 scopus 로고    scopus 로고
    • Primer on E-commerce and intellectual property issues
    • WIPO; Geneva: WIPO
    • WIPO, 2000. Primer On E-commerce And Intellectual Property Issues. Geneva: WIPO.
    • (2000)
  • 75
    • 0008579225 scopus 로고    scopus 로고
    • Managing information across the enterprise
    • New York: John Willey & Sons
    • Wysocki, R.K., DeMichiell, R.L., 1997. Managing Information Across the Enterprise. New York: John Willey & Sons.
    • (1997)
    • Wysocki, R.K.1    Demichiell, R.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.