메뉴 건너뛰기




Volumn 47, Issue , 2017, Pages 111-120

Policies for construction of information systems' security guidelines

Author keywords

End user guidelines; Security policies

Indexed keywords

INFORMATION SYSTEMS; INFORMATION USE; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 25144525048     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-0-387-35515-3_12     Document Type: Conference Paper
Times cited : (11)

References (38)
  • 2
    • 6744247045 scopus 로고
    • Logical Controls Specification: An approach to information system security
    • H. Klein & K. Kumar (eds.), Amsterdam: North-Holland
    • Baskerville, R., (1989), Logical Controls Specification: An approach to information system security. In H. Klein & K. Kumar (eds.) systems development for human progress. Amsterdam: North-Holland.
    • (1989) Systems Development for Human Progress
    • Baskerville, R.1
  • 3
    • 77957322954 scopus 로고
    • Information Security: Adapting to Survive
    • Vol., no., pp
    • Baskerville, R., (1993), Information Security: Adapting to Survive. Information Systems Security. Vol. 2, no. 1, pp. 40-47.
    • (1993) Information Systems Security , vol.2 , Issue.1 , pp. 40-47
    • Baskerville, R.1
  • 4
    • 84897776115 scopus 로고
    • The Second-Order Security Dilemma
    • W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.), London: Chapman & Hall, pp
    • Baskerville, R., (1995), The Second-Order Security Dilemma. in W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.) Information Technology and Changes in Organizational Work. London: Chapman & Hall, pp. 239-249.
    • (1995) Information Technology and Changes in Organizational Work , pp. 239-249
    • Baskerville, R.1
  • 5
    • 0029253405 scopus 로고
    • Specification and validation of a security policy model
    • February, vol., issue, pp
    • Boswell, A., (1995), Specification and validation of a security policy model. IEEE Transaction on Software Engineering. February, vol. 21, issue 2, pp. 63-68.
    • (1995) IEEE Transaction on Software Engineering , vol.21 , Issue.2 , pp. 63-68
    • Boswell, A.1
  • 10
    • 0023348314 scopus 로고
    • The development of proof a formal specification for a multilevel secure system
    • Vol.,., issue,. Pp
    • Glasgow, J.I & MacEwen, G.H., (1987), The development of proof a formal specification for a multilevel secure system. ACM Transactions on Computer Systems. Vol. 5., issue 2. Pp. 151-184.
    • (1987) ACM Transactions on Computer Systems , vol.5 , Issue.2 , pp. 151-184
    • Glasgow, J.I.1    Macewen, G.H.2
  • 11
    • 84870173215 scopus 로고    scopus 로고
    • End-User Computing Security Guidelines
    • Vol., No
    • Hale, R., (1996), End-User Computing Security Guidelines. Information System Security. Vol. 6, No.1.
    • (1996) Information System Security , vol.6 , Issue.1
    • Hale, R.1
  • 13
    • 0011648740 scopus 로고    scopus 로고
    • The IFIP Pink Summary-36 years of IFIP. Edited by H. Zemanek, Laxenburg, IFIP
    • Jarvinen, P., (1997), The new classification of research approaches. The IFIP Pink Summary-36 years of IFIP. Edited by H. Zemanek, Laxenburg, IFIP.
    • (1997) The New Classification of Research Approaches
    • Jarvinen, P.1
  • 16
    • 0029545652 scopus 로고
    • A New Model for Information Security Policies
    • Vol., No., p
    • Lindup, K. R., (1995), A New Model for Information Security Policies. Computer & Security, Vol. 14, No. 8, p. 691-695.
    • (1995) Computer & Security , vol.14 , Issue.8 , pp. 691-695
    • Lindup, K.R.1
  • 21
    • 19344364618 scopus 로고    scopus 로고
    • Advances in Computers, Academic Press
    • Sandhu, R., (1998), Role-Based Access Control. Advances in Computers, Vol.46, Academic Press.
    • (1998) Role-Based Access Control , vol.46
    • Sandhu, R.1
  • 22
    • 0027699087 scopus 로고
    • Lattice-based access controls
    • Pp
    • Sandhu, R.S, (1993), Lattice-based access controls. IEEE Computer. Pp. 9-19.
    • (1993) IEEE Computer , pp. 9-19
    • Sandhu, R.S.1
  • 23
    • 0028513932 scopus 로고
    • Access Control: Principle and Practice
    • vol., issue, pp
    • Sandhu, R., & Samarati, P., (1994), Access Control: Principle and Practice. IEEE Communications vol. 32, issue 9, pp. 40-48.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 25
    • 85066135140 scopus 로고    scopus 로고
    • 15th IFIP World Computer Congress. 'The Global Information Society on the Way to the Next Millennium'. SEC, TC11. Vienna
    • Spruit, M.E.M, (1998), Competing against human failing. 15th IFIP World Computer Congress. 'The Global Information Society on the Way to the Next Millennium'. SEC, TC11. Vienna.
    • (1998) Competing against Human Failing
    • Spruit, M.E.M.1
  • 26
    • 0000280419 scopus 로고
    • Effective IS Security: An empirical Study
    • June
    • Straub, D. W., (1990), Effective IS Security: An empirical Study. Information System Research. Vol. 1, Number 2, June, p. 255-277.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 27
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision Making
    • Vol., No., p
    • Straub, D.W. & Welke, R.J., (1998), Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, Vol. 22, No.4, p. 441-464
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 30
    • 0000241259 scopus 로고    scopus 로고
    • Growing Systems in Emergent Organizations
    • Vol., No., pp
    • Truex, D.P., Baskerville, R. & Klein, H., (1999), Growing Systems in Emergent Organizations. Communications of the ACM. Vol. 42, No.8, pp. 117-123.
    • (1999) Communications of the ACM , vol.42 , Issue.8 , pp. 117-123
    • Truex, D.P.1    Baskerville, R.2    Klein, H.3
  • 31
    • 0039639238 scopus 로고
    • Organizational computer security policy: The reality
    • Vol., no., pp
    • Warman, A.R., (1992), Organizational computer security policy: the reality. European Journal oflnformation Systems. Vol. 1, no. 5, pp. 305-310.
    • (1992) European Journal Oflnformation Systems , vol.1 , Issue.5 , pp. 305-310
    • Warman, A.R.1
  • 32
    • 0000613590 scopus 로고
    • Writing InfoSec Policies
    • Vol., No., p
    • Wood, C.C., (1995), Writing InfoSec Policies. Computer & Security, Vol. 14, No. 8, p. 667-674.
    • (1995) Computer & Security , vol.14 , Issue.8 , pp. 667-674
    • Wood, C.C.1
  • 33
    • 84992989148 scopus 로고    scopus 로고
    • Constructing difficult-to-guess passwords
    • Vol., no., pp
    • Wood, C.C., (1996a), Constructing difficult-to-guess passwords. Information Management & Computer Security. Vol. 4, no.l, pp. 43-44.
    • (1996) Information Management & Computer Security , vol.4 , pp. 43-44
    • Wood, C.C.1
  • 34
  • 35
    • 84993043234 scopus 로고    scopus 로고
    • A Policy for sending secret information over communications networks
    • Vol., no
    • Wood, C.C., (1996c), A Policy for sending secret information over communications networks. Information Management & Computer Security. Vol. 4, no.3.
    • (1996) Information Management & Computer Security , vol.4 , Issue.3
    • Wood, C.C.1
  • 36
    • 84993093101 scopus 로고    scopus 로고
    • Part ofthe foundation for secure systems: Separation of duties policy
    • Vol., no., pp
    • Wood, C.C., (1997a), Part ofthe foundation for secure systems: separation of duties policy. Information Management & Computer Security. Vol. 5, no.1, pp. 18-19.
    • (1997) Information Management & Computer Security , vol.5 , Issue.1 , pp. 18-19
    • Wood, C.C.1
  • 37
    • 84993081932 scopus 로고    scopus 로고
    • A secure password storage policy
    • Vol., no., pp
    • Wood, C.C., (1997b), A secure password storage policy. Information Management & Computer Security. Vol. 5, no.2, pp. 79-80.
    • (1997) Information Management & Computer Security , vol.5 , Issue.2 , pp. 79-80
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.