메뉴 건너뛰기




Volumn 2005, Issue 11, 2005, Pages 10-16

Information security architecture

(2)  Eloff, J H P a   Eloff, M M a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER SCIENCE; DATA PROCESSING; INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY;

EID: 28644433426     PISSN: 13613723     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1361-3723(05)70275-X     Document Type: Article
Times cited : (70)

References (24)
  • 1
    • 0038544668 scopus 로고    scopus 로고
    • Why we need a new definition of information security
    • Anderson JM Why we need a new definition of information security Computers & Security 22 4 2003 308 313
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 308-313
    • Anderson, J.M.1
  • 3
    • 28644443506 scopus 로고    scopus 로고
    • CRAMM (2003) available online at http://www.gammassl.co.uk/topics/hot5. html.
    • (2003)
  • 5
    • 84904279772 scopus 로고    scopus 로고
    • Information security management system: Processes and products
    • May 2003, Athens, Greece
    • Eloff MM & Eloff JHP (2003) Information Security Management System: processes and products Proceedings of IFIP SEC 2003, May 2003, Athens, Greece.
    • (2003) Proceedings of IFIP SEC 2003
    • Eloff, M.M.1    Eloff, J.H.P.2
  • 6
    • 0142247098 scopus 로고    scopus 로고
    • Computer crime case analysis
    • October 2003, ISSN: 1361-3723, Elsevier Advanced Technology
    • Eloff JHP & Granova A (2003) Computer Crime Case Analysis, Computer Fraud & Security October 2003, ISSN: 1361-3723, Elsevier Advanced Technology.
    • (2003) Computer Fraud & Security
    • Eloff, J.H.P.1    Granova, A.2
  • 7
    • 28644442258 scopus 로고    scopus 로고
    • FRAP (2003) available online at http://www.peltierassociates.com/frap. htm.
    • (2003)
  • 8
    • 0003692134 scopus 로고    scopus 로고
    • ISO/IEC 17799 International Organization for Standardization/ International Electrotechnical Commission, 01-Mar-2000
    • ISO/IEC 17799 (2000) Code of practice for Information Security Management, International Organization for Standardization/International Electrotechnical Commission, 01-Mar-2000, http://www.iso.ch/iso/en/ISOOnline. openerpage.
    • (2000) Code of Practice for Information Security Management
  • 13
    • 28644440809 scopus 로고    scopus 로고
    • accessed on 15 August 2003 META View
    • META Group, Inc. Available online at www.metagroup.co.za, accessed on 15 August 2003 META View (2002).
    • (2002)
  • 14
    • 0003768535 scopus 로고    scopus 로고
    • accessed on 3 February 2005 http://www.oed.com/
    • OCTAVE (2003) available online at http://www.cert.org/octave/ Oxford English Dictionary (2005) accessed on 3 February 2005, available online at http://www.oed.com/.
    • (2003) Oxford English Dictionary
  • 15
    • 0037775577 scopus 로고    scopus 로고
    • Holistic Security: Why Doing More Can Cost You Less and Lower Your Risk
    • Patterson T Holistic Security: Why Doing More Can Cost You Less and Lower Your Risk Computer Fraud & Security 2003 6 June, 2003 13 15
    • (2003) Computer Fraud & Security , vol.2003 , Issue.6 , pp. 13-15
    • Patterson, T.1
  • 20
    • 0343408120 scopus 로고    scopus 로고
    • Security policy conceptual modeling and formalization for networked information systems
    • Trček D Security policy conceptual modeling and formalization for networked information systems Computer Communications 23 2000 1716 1723
    • (2000) Computer Communications , vol.23 , pp. 1716-1723
    • Trček, D.1
  • 21
    • 0038205942 scopus 로고    scopus 로고
    • An integral framework for information systems security management
    • Trček D An integral framework for information systems security management Computers & Security 22 4 2003 337 360
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 337-360
    • Trček, D.1
  • 24
    • 49949099724 scopus 로고    scopus 로고
    • A framework for comparing different information security risk analysis methodologies
    • Accepted for the September 2005 White River, SA (*These documents are not international standards and therefore not finalised)
    • Vorster A & Labuschagne L (2005) A Framework for comparing different Information Security Risk Analysis Methodologies, Accepted for the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2005, White River, SA (*These documents are not international standards and therefore not finalised)
    • (2005) Annual South African Institute of Computer Scientists and Information Technologists Conference (SAICSIT)
    • Vorster, A.1    Labuschagne, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.