메뉴 건너뛰기




Volumn 12, Issue 3, 2007, Pages 1-6

Designing for security

(1)  Solari, Carlos a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; INFORMATION TECHNOLOGY; LIFE CYCLE; PRODUCT DEVELOPMENT; TELECOMMUNICATION SYSTEMS;

EID: 36549015263     PISSN: 10897089     EISSN: 15387305     Source Type: Journal    
DOI: 10.1002/bltj.20245     Document Type: Article
Times cited : (2)

References (4)
  • 1
    • 36549080923 scopus 로고    scopus 로고
    • Bell Labs Innovations
    • Lucent Technologies
    • Lucent Technologies, Bell Labs Innovations, "Bell Labs Network Security Framework," 2006.
    • (2006) Bell Labs Network Security Framework
  • 2
    • 36549041907 scopus 로고    scopus 로고
    • Enhanced Information Security in Software and Services: What Role for Government
    • Brussels, Belg, Feb. 27
    • V. Reding, "Enhanced Information Security in Software and Services: What Role for Government, Security Providers and Users?" European Information Security Awareness Day speech, (Brussels, Belg., Feb. 27, 2007), 〈http://ec.europa.eu/information_society/newsroom/cf/itemdetail.cfm? item_id=3239〉.
    • (2007) Security Providers and Users
    • Reding, V.1
  • 3
    • 36549082945 scopus 로고    scopus 로고
    • J. Vijayan, Breach Notification Laws: When Should Companies Tell All? Computerworld, Mar. 2, 2006, 〈http://www.computerworld.com/ securitytopics/security/story/0,10801,109161,00.html〉.
    • J. Vijayan, "Breach Notification Laws: When Should Companies Tell All?" Computerworld, Mar. 2, 2006, 〈http://www.computerworld.com/ securitytopics/security/story/0,10801,109161,00.html〉.
  • 4
    • 36549040060 scopus 로고    scopus 로고
    • Brown University, Sept
    • D. M. West, Global E-Govemment, 2005, Brown University, Sept. 2005, 〈http://www.insidepolitics.org/egovt05int.pdf〉.
    • (2005) Global E-Govemment, 2005
    • West, D.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.