메뉴 건너뛰기




Volumn 26, Issue 3, 2007, Pages 256-265

Holistic security management framework applied in electronic commerce

Author keywords

Electronic commerce security; Holistic security management; Security engineering; Security management process; Security requirements

Indexed keywords

ELECTRONIC COMMERCE; HIERARCHICAL SYSTEMS; INFORMATION SYSTEMS; ITERATIVE METHODS; RISK MANAGEMENT;

EID: 34248396442     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.11.003     Document Type: Article
Times cited : (37)

References (25)
  • 1
    • 34248336539 scopus 로고    scopus 로고
    • Björck F. Security Scandinavian style. Licentiate thesis, Stockholm University & Royal Institue of Technology; 2001.
  • 2
    • 0009687432 scopus 로고
    • A methodology for the development of secure application systems
    • Eloff J.H.P., and von Solms S.H. (Eds), IFIP, Chapman & Hall. ASSDM
    • Booysen H., and Eloff J. A methodology for the development of secure application systems. In: Eloff J.H.P., and von Solms S.H. (Eds). Information security - the next decade (1995), IFIP, Chapman & Hall. ASSDM 255-269
    • (1995) Information security - the next decade , pp. 255-269
    • Booysen, H.1    Eloff, J.2
  • 3
    • 0003407933 scopus 로고
    • Addison Wesley Longman [Anniversary edition]
    • Brooks F.P.J. The mythical man-month (1995), Addison Wesley Longman [Anniversary edition]
    • (1995) The mythical man-month
    • Brooks, F.P.J.1
  • 5
    • 34248353385 scopus 로고    scopus 로고
    • DTI, Coopers PW. Information security breaches survey 2004 technical report. Technical report, DTI, 2004.
  • 6
    • 34248400287 scopus 로고    scopus 로고
    • EUD 95/46/EC. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Union, 1995.
  • 7
    • 0013176783 scopus 로고    scopus 로고
    • IT-security and privacy: design and use of privacy-enhancing security mechanisms
    • Springer
    • Fischer-Hübner S. IT-security and privacy: design and use of privacy-enhancing security mechanisms. Lecture Notes in Computer Science (2001), Springer
    • (2001) Lecture Notes in Computer Science
    • Fischer-Hübner, S.1
  • 8
    • 8644292339 scopus 로고
    • Achieving an integrated design: the way forward for information security
    • Eloff J.H.P., and von Solms S.H. (Eds), IFIP, Chapman & Hall
    • Hitchings J. Achieving an integrated design: the way forward for information security. In: Eloff J.H.P., and von Solms S.H. (Eds). Information security - the next decade (1995), IFIP, Chapman & Hall 369-383
    • (1995) Information security - the next decade , pp. 369-383
    • Hitchings, J.1
  • 10
    • 34248325546 scopus 로고    scopus 로고
    • ISO 17799. ISO/IEC 17799:2000. Information technology - ode of practice for information security management, International Organization for Standardization; 2000.
  • 11
    • 34248392945 scopus 로고    scopus 로고
    • ISO 27001. ISO/IEC 27001:2005. Information technology - security techniques - information security management systems - requirements, International Organization for Standardization; 2005.
  • 12
    • 34248349415 scopus 로고    scopus 로고
    • ISO 9000. ISO/IEC 9000:2000. Quality management systems - fundamentals and vocabulary, International Organization for Standardization; 2000.
  • 14
    • 0036037169 scopus 로고    scopus 로고
    • Jürjens J. Using umlsec and goal-trees for secure systems development. In: Symposium of applied computing (SAC 2002); 2002. p. 1026-31.
  • 16
    • 0035506385 scopus 로고    scopus 로고
    • Extreme programming from a CMM perspective
    • Paulk M. Extreme programming from a CMM perspective. IEEE Software 18 6 (2001) 19-26
    • (2001) IEEE Software , vol.18 , Issue.6 , pp. 19-26
    • Paulk, M.1
  • 17
    • 34248377673 scopus 로고    scopus 로고
    • Paulk MC, Curtis B, Chrissis MB, Weber CV. Capability maturity model - SE. Version 1.1, Technical report, Software Engineering Institute; 1993.
  • 19
    • 34248371105 scopus 로고    scopus 로고
    • SSE-CMM. Systems security engineering capability maturity model. SSE-CMM Project, v. 3.0 edition; 2003.
  • 20
    • 0038205942 scopus 로고    scopus 로고
    • An integral framework for information systems security management
    • Trcek D. An integral framework for information systems security management. Computers & Security 22 4 (2003) 337-360
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 337-360
    • Trcek, D.1
  • 22
    • 0034814690 scopus 로고    scopus 로고
    • Information security - a multidimensional discipline
    • von Solms B. Information security - a multidimensional discipline. Computer & Security 20 (2001) 504-508
    • (2001) Computer & Security , vol.20 , pp. 504-508
    • von Solms, B.1
  • 23
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • Zuccato A. Holistic security requirement engineering for electronic commerce. Computers & Security 23 1 (2004) 63-76
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63-76
    • Zuccato, A.1
  • 24
    • 84885059632 scopus 로고    scopus 로고
    • Zuccato A. A decision matrix approach to prioritize holistic security requirements in e-commerce. In: 20th IFIP information security conference - security and privacy in the age of ubiquitous computing. IFIP TC 11; 2005a.
  • 25
    • 34248390832 scopus 로고    scopus 로고
    • Zuccato A. Holistic information security management framework - for electronic commerce. Doctoral thesis, Karlstad University Studies; 2005b.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.