메뉴 건너뛰기




Volumn 12, Issue 3, 2007, Pages 65-78

Comparing reliability and security: Concepts, requirements, and techniques

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION FLOWS; RELIABILITY ENGINEERING; RELIABILITY FAILURES; SECURE SYSTEMS;

EID: 36649016915     PISSN: 10897089     EISSN: 15387305     Source Type: Journal    
DOI: 10.1002/bltj.20250     Document Type: Article
Times cited : (10)

References (19)
  • 1
    • 0011312585 scopus 로고    scopus 로고
    • Fault-Tolerant Telecommunication System Patterns
    • J. M. Vlissides, J. O. Coplien, and N. L. Kerth, eds, Addison-Wesley, Reading, MA
    • M. E. Adams, J. O. Coplien, R. J. Gamoke, R. S. Hanmer, F. Keeve, and K. L. Nicodemus, "Fault-Tolerant Telecommunication System Patterns," Pattern Languages of Program Design 2 (J. M. Vlissides, J. O. Coplien, and N. L. Kerth, eds.), Addison-Wesley, Reading, MA, 1996, pp. 549-573.
    • (1996) Pattern Languages of Program Design , vol.2 , pp. 549-573
    • Adams, M.E.1    Coplien, J.O.2    Gamoke, R.J.3    Hanmer, R.S.4    Keeve, F.5    Nicodemus, K.L.6
  • 2
    • 12344308304 scopus 로고    scopus 로고
    • A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Trans. Dependable and Secure Computing, 1:1 (2004), 11-33.
    • A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, 1:1 (2004), 11-33.
  • 3
    • 36649037606 scopus 로고    scopus 로고
    • B. Blakley, C. Heath, and Members of the Open Group Security Forum, Security Design Patterns, Tech. Guide, Apr. 2004,
    • B. Blakley, C. Heath, and Members of the Open Group Security Forum, "Security Design Patterns," Tech. Guide, Apr. 2004,
  • 4
    • 84879607117 scopus 로고    scopus 로고
    • Federal Communications Commission
    • Federal Communications Commission, "Network Outage Reporting System (NORS)," 〈http://www.fcc.gov/oet/outage/〉.
    • Network Outage Reporting System (NORS)
  • 7
    • 33750349219 scopus 로고    scopus 로고
    • Documenting Architectures with Patterns
    • R. S. Hanmer and K. F. Kocan, "Documenting Architectures with Patterns," Bell Labs Tech. J. 9:1 (2004), 143-163.
    • (2004) Bell Labs Tech. J , vol.9 , Issue.1 , pp. 143-163
    • Hanmer, R.S.1    Kocan, K.F.2
  • 8
    • 28044457328 scopus 로고    scopus 로고
    • International Organization for Standardization and International Electrotechnical Commission, ISO/IEC, June 15, 17799:2005
    • International Organization for Standardization and International Electrotechnical Commission, "Information Technology-Security Techniques-Code of Practice for Information Security Management," ISO/IEC 17799:2005, June 15, 2005, 〈http://www.iso.org〉.
    • (2005) Information Technology-Security Techniques-Code of Practice for Information Security Management
  • 9
    • 36649024360 scopus 로고    scopus 로고
    • International Organization for Standardization and International Electrotechnical Commission, Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model - Part 2: Security Functional Requirements - Part 3: Security Assurance Requirements, Common Criteria, ISO/IEC 15408-1:2005, Sep. 22, 2005, 〈http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNU MBER= 40612〉.
    • International Organization for Standardization and International Electrotechnical Commission, "Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model - Part 2: Security Functional Requirements - Part 3: Security Assurance Requirements, Common Criteria," ISO/IEC 15408-1:2005, Sep. 22, 2005, 〈http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER= 40612〉.
  • 10
    • 36649016886 scopus 로고    scopus 로고
    • International Organization for Standardization and International Electrotechnical Commission, Information Technology - Security Techniques-IT Network Security - Part 2: Network Security Architecture, ISO/IEC 18028-2, Feb. 2006, 〈http://www.iso.org/iso/en/CatalogueDetailPage. Catalogue Detail?CSNUMBER=40009〉.
    • International Organization for Standardization and International Electrotechnical Commission, "Information Technology - Security Techniques-IT Network Security - Part 2: Network Security Architecture," ISO/IEC 18028-2, Feb. 2006, 〈http://www.iso.org/iso/en/CatalogueDetailPage. Catalogue Detail?CSNUMBER=40009〉.
  • 11
    • 36649027113 scopus 로고    scopus 로고
    • International Telecommunication Union, Telecommunication Standardization Sector, TMN Management Functions, ITU-T Rec. M.3400, Feb. 2000, 〈http://www.itu.int〉.
    • International Telecommunication Union, Telecommunication Standardization Sector, "TMN Management Functions," ITU-T Rec. M.3400, Feb. 2000, 〈http://www.itu.int〉.
  • 12
    • 36649014691 scopus 로고    scopus 로고
    • International Telecommunication Union, Telecommunication Standardization Sector, Security Architecture for Systems Providing End-to-End Communications, ITU-T Rec. X.805, Oct. 2003, 〈http://www.itu. int〉.
    • International Telecommunication Union, Telecommunication Standardization Sector, "Security Architecture for Systems Providing End-to-End Communications," ITU-T Rec. X.805, Oct. 2003, 〈http://www.itu. int〉.
  • 13
    • 36649005343 scopus 로고    scopus 로고
    • International Telecommunication Union, Telecommunication Standardization Sector, Security for the Management Plane: Security Requirements, ITU-T Rec. M.3016.1, Apr. 2005, 〈http://www.itu.int〉.
    • International Telecommunication Union, Telecommunication Standardization Sector, "Security for the Management Plane: Security Requirements," ITU-T Rec. M.3016.1, Apr. 2005, 〈http://www.itu.int〉.
  • 14
    • 33745883571 scopus 로고    scopus 로고
    • Software Security is Software Reliability
    • F. Lindner, "Software Security is Software Reliability," Commun. ACM, 49:6 (2006), 57-61.
    • (2006) Commun. ACM , vol.49 , Issue.6 , pp. 57-61
    • Lindner, F.1
  • 15
    • 36649022653 scopus 로고    scopus 로고
    • QuEST Forum, TL 9000 Quality Management System Requirements Handbook, Book 1, Release 3.0, American Society for Quality, Milwaukee, WI, 2001
    • QuEST Forum, TL 9000 Quality Management System Requirements Handbook, Book 1, Release 3.0, American Society for Quality, Milwaukee, WI, 2001.
  • 16
    • 0038546179 scopus 로고    scopus 로고
    • L. Rising ed, Cambridge University Press, Cambridge
    • L. Rising (ed.), Design Patterns in Communications Software, Cambridge University Press, Cambridge, 2001.
    • (2001) Design Patterns in Communications Software
  • 19
    • 70349462879 scopus 로고    scopus 로고
    • H. F. Tipton and K. Henry eds, Auerbach, Boca Raton, FL
    • H. F. Tipton and K. Henry (eds.), Official (ISC)2 Guide to the CISSP CBK, Auerbach, Boca Raton, FL, 2006.
    • (2006) Official (ISC)2 Guide to the CISSP CBK


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.