메뉴 건너뛰기




Volumn , Issue , 2004, Pages 226-233

Measuring IT security - A method based on Common Criteria's security functional requirements

Author keywords

CC's security functional requirements; Common Criteria (CC); Distributed information systems; IT security; Securability

Indexed keywords

COMMON CRITERIA (CC); COMMON CRITERIA'S (CC) SECURITY FUNCTIONAL REQUIREMENTS; DISTRIBUTED INFORMATION SYSTEMS; IT SECURITY; SECURABILITY;

EID: 15944391638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (20)
  • 2
    • 70350670148 scopus 로고    scopus 로고
    • Evaluation of the security of components in distributed information systems
    • FOI, Linköping, Sweden
    • Andersson, R., Hunstad H., & Hallberg, J. (2003). Evaluation of the security of components in distributed information systems, Scientific report FOI-R-1042-SE, FOI, Linköping, Sweden.
    • (2003) Scientific Report , vol.FOI-R-1042-SE
    • Andersson, R.1    Hunstad, H.2    Hallberg, J.3
  • 7
    • 15944362322 scopus 로고    scopus 로고
    • Design for securability - Applying engineering principles to the design of security architectures
    • Boston, Nov. 6-8, 2002. Linköping, FOI 2002, (FOI-S-0721-SE)
    • Hunstad, A. & Hallberg, J. (2002). Design for securability - Applying engineering principles to the design of security architectures. ACSA workshop on the application of engineering principles to system security design. Boston, Nov. 6-8, 2002. Linköping, FOI 2002, 8 p. (FOI-S-0721-SE)
    • (2002) ACSA Workshop on the Application of Engineering Principles to System Security Design
    • Hunstad, A.1    Hallberg, J.2
  • 9
    • 15944366632 scopus 로고    scopus 로고
    • A Common Criteria framework for the evaluation of Information Technology systems security
    • Copenhagen, Denmark. Chapman & Hall
    • Kruger, R. & Eloff, J. (1997). A Common Criteria framework for the evaluation of Information Technology systems security. IFIP TC11 13 international conference on Information Security (SEC '97). Copenhagen, Denmark. Chapman & Hall.
    • (1997) IFIP TC11 13 International Conference on Information Security (SEC '97)
    • Kruger, R.1    Eloff, J.2
  • 13
    • 0034593315 scopus 로고    scopus 로고
    • Adversary work factor as a metric for information assurance
    • Cork, Ireland, Sep. 18-22, 2000
    • Schudel, G. & Wood, B. (2000). Adversary Work Factor as a Metric for Information Assurance. Proceedings of the New Security Paradigms Workshop. Cork, Ireland, Sep. 18-22, 2000.
    • (2000) Proceedings of the New Security Paradigms Workshop
    • Schudel, G.1    Wood, B.2
  • 17
    • 15944369715 scopus 로고    scopus 로고
    • EAL4, March 2002
    • Sony Corporation (2002), FeliCa Contactless Smart Card RC-5560, EAL4, March 2002.
    • (2002) FeliCa Contactless Smart Card , vol.RC-5560
  • 20
    • 0034816038 scopus 로고    scopus 로고
    • A method for designing secure solutions
    • Armonk 2001
    • Whitmore, J.J. (2001). A method for designing secure solutions. IBM Systems Journal, Armonk 2001, Vol. 40, Issue 3.
    • (2001) IBM Systems Journal , vol.40 , Issue.3
    • Whitmore, J.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.