메뉴 건너뛰기




Volumn 27, Issue 21, 2003, Pages 63-68

Method for the structured security architecture design of secondary systems

Author keywords

DGSA; Dispatching automation of electric power systems; MOAT; Security and secrecy of computer system; Structured design method

Indexed keywords

AUTOMATION; COMPUTER SYSTEMS; ELECTRIC LOAD DISPATCHING; ELECTRIC POWER SYSTEMS; STRUCTURAL DESIGN;

EID: 1542504562     PISSN: 10001026     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (11)
  • 1
    • 26744448507 scopus 로고    scopus 로고
    • Normalizing information security developing with theories of information security engineering
    • Shen Changxiang. Normalizing Information Security Developing with Theories of Information Security Engineering. China Computer World, 2001(34): B01
    • (2001) China Computer World , Issue.34
    • Shen, C.1
  • 6
    • 1542555763 scopus 로고    scopus 로고
    • Applying the DoD goal security architecture as a methodology for the development of system and enterprise security architectures
    • New York: IEEE
    • Lowman T, Mosier D. Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures. New York: IEEE, 1997
    • (1997)
    • Lowman, T.1    Mosier, D.2
  • 7
    • 0035436175 scopus 로고    scopus 로고
    • An entity security architecture for computer networks
    • Duan Haixin, Wu Jianping. An Entity Security Architecture for Computer Networks. Chinese Journal of Computers, 2001, 24(8): 853-859
    • (2001) Chinese Journal of Computers , vol.24 , Issue.8 , pp. 853-859
    • Duan, H.1    Wu, J.2
  • 8
    • 1542451264 scopus 로고    scopus 로고
    • Information technology-guidelines for the management of IT security. Part 5: Management guidance on network security
    • ISO/IEC TR 13335-5, First Edition
    • ISO/IEC TR 13335-5. Information Technology - Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security (First Edition). 2001
    • (2001)
  • 9
    • 26744457321 scopus 로고    scopus 로고
    • Practical computer security analysis
    • Thesis, Charlottesville: University of Virginia
    • Kienzle D M. Practical Computer Security Analysis (Thesis). Charlottesville: University of Virginia, 1998
    • (1998)
    • Kienzle, D.M.1
  • 10
    • 0003765589 scopus 로고    scopus 로고
    • Information technology-security techniques-evaluation criteria for IT security. Part 2: Security functions requirements
    • ISO/IEC 15408-2, First Edition
    • ISO/IEC 15408-2. Information Technology-Security Techniques-Evaluation Criteria for IT Security, Part 2: Security Functions Requirements (First Edition). 1999
    • (1999)
  • 11
    • 26744440356 scopus 로고    scopus 로고
    • Design security architecture for enterprise information systems
    • Ma Dongping. Design Security Architecture for Enterprise Information Systems. China Computer World, 2001(34): B08
    • (2001) China Computer World , Issue.34
    • Ma, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.