메뉴 건너뛰기




Volumn 23, Issue 17, 2000, Pages 1716-1723

Security policy conceptual modeling and formalization for networked information systems

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DATA STRUCTURES; LAWS AND LEGISLATION; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 0343408120     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(00)00257-7     Document Type: Article
Times cited : (13)

References (26)
  • 2
    • 85031548189 scopus 로고    scopus 로고
    • ISO, TC68/SC2/WG4, TR 13569, CD N481, Geneva
    • ISO, Information Security Guidelines, TC68/SC2/WG4, TR 13569, CD N481, Geneva, 1997.
    • (1997) Information Security Guidelines
  • 7
    • 84883266618 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899-0001
    • National Institute of Standards and Technology, Computer Security Handbook, Computer Systems Laboratory, Gaithersburg, MD 20899-0001.
    • Computer Security Handbook
  • 11
    • 85031541906 scopus 로고    scopus 로고
    • Harmonizer - A Tool for Dealing with Information Security Requirements
    • Trondheim, November
    • J. Leiwo et al., Harmonizer - A Tool for Dealing with Information Security Requirements, Proceedings of the 3rd NWSCS, Trondheim, November 1998.
    • (1998) Proceedings of the 3rd NWSCS
    • Leiwo, J.1
  • 12
    • 85031552384 scopus 로고    scopus 로고
    • ISO, CD 13568, JTC1 SC22, September 1995, Geneva
    • ISO, Z - version 1.2, CD 13568, JTC1 SC22, September 1995, Geneva.
    • Z - Version 1.2
  • 13
    • 0030108849 scopus 로고    scopus 로고
    • Security Policy Space Definition and Structuring
    • Trček D., et al. Security Policy Space Definition and Structuring. Computer Standards and Interfaces. 18:1996;191-196.
    • (1996) Computer Standards and Interfaces , vol.18 , pp. 191-196
    • Trček, D.1
  • 14
    • 0003783398 scopus 로고
    • Information Processing Systems
    • ISO, ISO 7498-2, July
    • ISO, Information Processing Systems, OSI RM - Security Architecture, ISO 7498-2, July 1988.
    • (1988) OSI RM - Security Architecture
  • 16
    • 85031552939 scopus 로고
    • ITU-T, X.509(E), Geneva
    • ITU-T, Authentication Framework, X.509(E), Geneva, 1993.
    • (1993) Authentication Framework
  • 25
    • 0342287013 scopus 로고    scopus 로고
    • Applying fuzzy logic to the multipolicy paradigm
    • Hosmer H.H. Applying fuzzy logic to the multipolicy paradigm. Computer Security Journal. 10:(11):2000;34-45.
    • (2000) Computer Security Journal , vol.10 , Issue.11 , pp. 34-45
    • Hosmer, H.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.