메뉴 건너뛰기




Volumn 147, Issue , 2004, Pages 29-45

Security modelling for risk analysis

Author keywords

Countermeasures; Risk analysis; Security documentation; Security models; Security standards; Threat trees

Indexed keywords

RADAR COUNTERMEASURES; RISK ASSESSMENT; SECURITY OF DATA;

EID: 48249125545     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8143-x_3     Document Type: Conference Paper
Times cited : (6)

References (11)
  • 1
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for Information Systems Development
    • R. Baskerville, Information Systems Security Design Methods: Implications for Information Systems Development. ACMComputer Surveys, 25(4) 1993,375-414.
    • (1993) ACMComputer Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 3
    • 5844412980 scopus 로고    scopus 로고
    • Code of Practice: A Standard for Information Security Management. Information Security in Research and Business
    • Editors: Yngstrom and Carlsen), lFIP Sec.'97, Copenhagen, Denmark, 14-16May 1997, Chapman & Hall
    • L. F. Kwok and D. Longley. Code of Practice: A Standard for Information Security Management. Information Security in Research and Business, Proc. IFIP TCII 13th Int. Conf. on Information Security (Editors: Yngstrom and Carlsen), lFIP Sec.'97, Copenhagen, Denmark, 14-16May 1997, Chapman & Hall 1997, pp.78-90.
    • (1997) Proc. IFIP TCII 13th Int. Conf. On Information Security , pp. 78-90
    • Kwok, L.F.1    Longley, D.2
  • 4
    • 84986089117 scopus 로고    scopus 로고
    • A Hypertext Information Security Model for Organisations
    • L. F. Kwok. A Hypertext Information Security Model for Organisations. Information Management and Computer Security, 5 (4) 1997, 138-148.
    • (1997) Information Management and Computer Security , vol.5 , Issue.4 , pp. 138-148
    • Kwok, L.F.1
  • 7
    • 0030385768 scopus 로고    scopus 로고
    • A Security Officer's Workbench
    • L. F. Kwok and D. Longley. A Security Officer's Workbench. Computers and Security, 15 (8) 1996,695-700.
    • (1996) Computers and Security , vol.15 , Issue.8 , pp. 695-700
    • Kwok, L.F.1    Longley, D.2
  • 8
    • 5844427027 scopus 로고
    • A Methodology for Describing Information and Physical Security Architectures. IT Security: The Need for International Cooperation
    • Editors Gable and Caelli), lFIP Sec.'92, Singapore, 27-29 May 1992, NY:EIsevier Science Publishers
    • W. Caelli, D. Longley, and A. B. Tickle. A Methodology for Describing Information and Physical Security Architectures. IT Security: The Need for International Cooperation, Proc. IFIP TCII 8'h Int. Conf on Information Security (Editors Gable and Caelli), lFIP Sec.'92, Singapore, 27-29 May 1992, NY:EIsevier Science Publishers 1992, pp.277-296.
    • (1992) Proc. IFIP TCII 8'h Int. Conf On Information Security , pp. 277-296
    • Caelli, W.1    Longley, D.2    Tickle, A.B.3
  • 9
    • 84902511626 scopus 로고    scopus 로고
    • ACSW Frontiers 2003 (Eds. Johnson, Montague and Steketee), Australasian Information Security Workshop (AISW2003), 4-7 Feb., Adelaide, Australia
    • P. Fung, L. F. Kwok and D. Longley. Eleetronic Information Security Documentation. ACSW Frontiers 2003 (Eds. Johnson, Montague and Steketee), Australasian Information Security Workshop (AISW2003), 4-7 Feb. 2003, Adelaide, Australia, pp 25-31.
    • (2003) Eleetronic Information Security Documentation , pp. 25-31
    • Fung, P.1    Kwok, L.F.2    Longley, D.3
  • 10
    • 84902518808 scopus 로고
    • The Directory, CCITT Rec. X500-X5211 ISO/IEC Standard 9594
    • The Directory, CCITT Rec. X500-X5211 ISO/IEC Standard 9594:1993.
    • (1993)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.