|
Volumn 2660, Issue , 2003, Pages 605-613
|
Threat description for the PP by using the concept of the assets protected by TOE
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTERS;
COMMON CRITERIA;
EVALUATION CRITERIA;
PROTECTION PROFILE;
SECURITY ENVIRONMENTS;
SECURITY POLICY;
SECURITY REQUIREMENTS;
ARTIFICIAL INTELLIGENCE;
|
EID: 35248872976
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/3-540-44864-0_63 Document Type: Review |
Times cited : (15)
|
References (21)
|