메뉴 건너뛰기




Volumn 3732 LNCS, Issue , 2006, Pages 957-963

Applying security engineering to build security countermeasures: An introduction

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTER SOFTWARE; CRYPTOGRAPHY; NETWORK PROTOCOLS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33745295147     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11558958_116     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 7
    • 33646015824 scopus 로고    scopus 로고
    • Approaches and methods of security engineering
    • Tai-Hoon, Kim: Approaches and Methods of Security Engineering, ICCMSE 2004
    • ICCMSE 2004
    • Kim, T.-H.1
  • 8
    • 35248872976 scopus 로고    scopus 로고
    • Threat description for the PP by using the concept of the assets protected by TOE
    • ICCS 2003
    • Tai-Hoon Kim, Byung-Gyu No, Dong-chun Lee: Threat Description for the PP by Using the Concept of the Assets Protected by TOE, ICCS 2003, LNCS 2660, Part 4, pp. 605-613
    • LNCS , vol.2660 , Issue.4 PART , pp. 605-613
    • Kim, T.-H.1    No, B.-G.2    Lee, D.-C.3
  • 9
    • 24944572875 scopus 로고    scopus 로고
    • The comparison between the level of process model and the evaluation assurance level
    • KIAS
    • Tai-hoon Kim, Tae-seung Lee, Kyu-min Cho, Koung-goo Lee: The Comparison Between The Level of Process Model and The Evaluation Assurance Level. The Journal of The Information Assurance, Vol.2, No.2, KIAS (2002)
    • (2002) The Journal of the Information Assurance , vol.2 , Issue.2
    • Kim, T.-H.1    Lee, T.-S.2    Cho, K.-M.3    Lee, K.-G.4
  • 10
    • 24944503344 scopus 로고    scopus 로고
    • A study on the efficiency elevation method of IT security system evaluation via process improvement
    • KIAS
    • Tai-hoon Kim, Yune-gie Sung, Kyu-min Cho, Sang-ho Kim, Byung-gyu No: A Study on The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement, The Journal of The Information Assurance, Vol.3, No.1, KIAS (2003)
    • (2003) The Journal of the Information Assurance , vol.3 , Issue.1
    • Kim, T.-H.1    Sung, Y.-G.2    Cho, K.-M.3    Kim, S.-H.4    No, B.-G.5
  • 13
    • 35248872976 scopus 로고    scopus 로고
    • Threat description for the PP by using the concept of the assets protected by TOE
    • ICCS 2003
    • Tai-Hoon Kim, Byung-Gyu No, Dong-chun Lee: Threat Description for the PP by Using the Concept of the Assets Protected by TOE, ICCS 2003, LNCS 2660, Part 4, pp. 605-613
    • LNCS , vol.2660 , Issue.4 PART , pp. 605-613
    • Kim, T.-H.1    No, B.-G.2    Lee, D.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.