메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1316-1319

A comprehensive approach to designing internet security taxonomy

Author keywords

Cryptography; Internet security; Taxonomy

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC COMMERCE; FINANCIAL DATA PROCESSING; INTERNET; TAXONOMIES;

EID: 39049150442     PISSN: 08407789     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCECE.2006.277393     Document Type: Conference Paper
Times cited : (9)

References (14)
  • 2
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Security Flaws
    • September, Pages
    • C. Landwehr, A. Bull, John P. McDermott, and W. Choi, "A Taxonomy of Computer Security Flaws," ACM Computing Surveys, Vol. 26, No. 3, September 1994, Page(s): 211-254.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.1    Bull, A.2    McDermott, J.P.3    Choi, W.4
  • 7
    • 33847644538 scopus 로고    scopus 로고
    • Special Publication No. 800-33, December, Also available at
    • National Institute of Standards and Technology (NIST), "Underlying Technical Models for Information, Technology Security", Special Publication No. 800-33, December 2001. Also available at http://csrc.nist.gov/publications/ nistpubs/800-33/sp800-33.pdf
    • (2001) Underlying Technical Models for Information, Technology Security
  • 8
    • 39049101426 scopus 로고    scopus 로고
    • Open Source Security Testing Methodology Manual Pitfalls (OSSTMM), Version 2.5, August 2003, available at http://ideahamster.org/projects/osstmm. htm.
    • Open Source Security Testing Methodology Manual Pitfalls (OSSTMM), Version 2.5, August 2003, available at http://ideahamster.org/projects/osstmm. htm.
  • 9
    • 39049145734 scopus 로고    scopus 로고
    • Common Criteria (CC) project report, Common Criteria for Information Technology Security Evaluation, August 1999, available at http://www.commoncriteria.org/.
    • Common Criteria (CC) project report, "Common Criteria for Information Technology Security Evaluation", August 1999, available at http://www.commoncriteria.org/.
  • 11
    • 0006917446 scopus 로고    scopus 로고
    • Internet privacy
    • February, Pages
    • L. Cranor, Internet privacy, Communications of the ACM, February 1999, Volume 42, Issue 2, Page(s) 28-38.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 28-38
    • Cranor, L.1
  • 12
    • 0003531721 scopus 로고    scopus 로고
    • An Analysis of Security Incidents on the Internet
    • Ph.D. Thesis, Pittsburgh, USA, Also available at
    • John D. Howard, "An Analysis of Security Incidents on the Internet", Ph.D. Thesis, Carnegie Mellon University, Pittsburgh, USA, 1997. Also available at http://www.cert.org/research/JHThesis/Word6/
    • (1997)
    • Howard, J.D.1
  • 13
    • 0021425586 scopus 로고    scopus 로고
    • Can Computer Crime Be Stopped?
    • T. Perry and P. Wallich, "Can Computer Crime Be Stopped?", IEEE Spectrum, Vol. 21, No. 5.
    • IEEE Spectrum , vol.21 , Issue.5
    • Perry, T.1    Wallich, P.2
  • 14
    • 39049138419 scopus 로고    scopus 로고
    • Addison -Wesley, Great Britain, Pages
    • James Essinger, "Internet Trust and Security", Addison -Wesley, Great Britain 2001, Page(s): 23-43.
    • (2001) Internet Trust and Security , pp. 23-43
    • Essinger, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.