메뉴 건너뛰기




Volumn 4489 LNCS, Issue PART 3, 2007, Pages 1024-1031

Risk assessment method based on business process-oriented asset evaluation for information system security

Author keywords

[No Author keywords available]

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; ASSET MANAGEMENT; INFORMATION SYSTEMS; MATRIX ALGEBRA; SECURITY OF DATA;

EID: 38149131382     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72588-6_165     Document Type: Conference Paper
Times cited : (20)

References (12)
  • 1
    • 38149005428 scopus 로고    scopus 로고
    • TR 13335(Part 1): Concepts and Models for IT Security,
    • ISO/IEC ISO/IEC JTC1/SC 27
    • ISO/IEC TR 13335(Part 1): Concepts and Models for IT Security, ISO/IEC JTC1/SC 27, 1996.
    • (1996)
  • 2
    • 38149058107 scopus 로고    scopus 로고
    • TR 13335(Part 2): Managing and Planning IT Security,
    • ISO/IEC ISO/IEC JTC1/SC 27
    • ISO/IEC TR 13335(Part 2): Managing and Planning IT Security, ISO/IEC JTC1/SC 27, 1997.
    • (1997)
  • 3
    • 38149117953 scopus 로고    scopus 로고
    • TR 13335(Part 3): Techniques for the Management of IT Security,
    • ISO/IEC ISO/IEC JTC1/SC 27
    • ISO/IEC TR 13335(Part 3): Techniques for the Management of IT Security, ISO/IEC JTC1/SC 27, 1997.
    • (1997)
  • 4
    • 38149132294 scopus 로고    scopus 로고
    • NIST Special Publication 800-30: Computer Security-Risk Management Guide, NIST, 2001.
    • NIST Special Publication 800-30: Computer Security-Risk Management Guide, NIST, 2001.
  • 6
    • 38148998613 scopus 로고    scopus 로고
    • BS 7799: Guide to Risk Assessment and Risk management, BSI, 1998.
    • BS 7799: Guide to Risk Assessment and Risk management, BSI, 1998.
  • 8
    • 38149122092 scopus 로고    scopus 로고
    • CSE MG-3: A Guide to Risk Assessment and Safeguard Selection For Information Technology Systems, Communications Security Establishment, Jan. 1996.
    • CSE MG-3: A Guide to Risk Assessment and Safeguard Selection For Information Technology Systems, Communications Security Establishment, Jan. 1996.
  • 9
    • 38149087428 scopus 로고    scopus 로고
    • Risk Analysis and Management Standards for Public Information Systems Security-Concepts and Models
    • Risk Analysis and Management Standards for Public Information Systems Security-Concepts and Models, TTA-Korea, 1998.
    • (1998) TTA-Korea
  • 10
    • 38149065132 scopus 로고    scopus 로고
    • Risk Analysis and Management Standards for Public Information Systems Security-Risk Analysis
    • Risk Analysis and Management Standards for Public Information Systems Security-Risk Analysis, TTA-Korea, 2000.
    • (2000) TTA-Korea
  • 11
    • 38149047423 scopus 로고    scopus 로고
    • Two-Dimensional Qualitative Asset analysis Method based on Business Process-Oriented Asset Evaluation
    • Dec
    • Jung-Ho Eom, et. al, 'Two-Dimensional Qualitative Asset analysis Method based on Business Process-Oriented Asset Evaluation', Journal of KIPS, pp.79-85, Dec. 2005.
    • (2005) Journal of KIPS , pp. 79-85
    • Eom, J.1    et., al.2
  • 12
    • 38149014588 scopus 로고    scopus 로고
    • A Risk Analysis Model For information System Security
    • journal of KIPS, pp, Sep
    • Kang Kim, et. al, 'A Risk Analysis Model For information System Security', journal of KIPS, pp.60-67, Sep. 2002.
    • (2002) , pp. 60-67
    • Kim, K.1    et., al.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.