메뉴 건너뛰기




Volumn 16, Issue 6, 2007, Pages 332-343

Security functional components for building a secure network computing environment

Author keywords

[No Author keywords available]

Indexed keywords


EID: 51949113164     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1080/10658980701747245     Document Type: Article
Times cited : (4)

References (21)
  • 6
    • 0003563348 scopus 로고
    • New York: Van Nostrand Reinhold Co., Inc.
    • Gasser, M. (1988). Building a Secure Computer System. New York: Van Nostrand Reinhold Co., Inc., pp. 57-72.
    • (1988) Building a Secure Computer System , pp. 57-72
    • Gasser, M.1
  • 8
    • 84873387771 scopus 로고
    • London, June
    • Information Technology Security Evaluation Criteria (ITSEC). (1991). Department of Trade and Industry, London, June.
    • (1991) Department of Trade and Industry
  • 9
    • 0019608720 scopus 로고
    • Formal models for computer security
    • September
    • Landwehr, C. (1981). Formal models for computer security, ACM Computing Surveys, 13: 3, p. 247, September.
    • (1981) ACM Computing Surveys , Issue.3 , pp. 247
    • Landwehr, C.1
  • 10
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • 9-16, January
    • Mclean, J. (1990). The specification and modeling of computer security, Computer, 23(1):9-16, January.
    • (1990) Computer , vol.23 , Issue.1
    • McLean, J.1
  • 12
    • 85024077883 scopus 로고
    • Volumes, II, version 1, December
    • National institute of Standards and Technology and the National Security Agency. (1992). Federal Criteria (FC) for Information Technology Security, Volumes I and II, version 1, December.
    • (1992) Federal Criteria (FC) for Information Technology Security , vol.1
  • 14
    • 0016555241 scopus 로고
    • The protection of information in computer systems, proc
    • Available at
    • Salzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems, Proc. IEEE, vol. 63. pp. 1278-1308. Available at http://www.ieee.org/web/publications/procieee/
    • (1975) IEEE , vol.63 , pp. 1278-1308
    • Salzer, J.H.1    Schroeder, M.D.2
  • 15
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • September
    • Sandhu, R. S., & Samarati, P. (1994). Access control: Principles and practice, IEEE Communication Magazine, September: pp 40-48.
    • (1994) IEEE Communication Magazine , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 18
    • 0030377647 scopus 로고    scopus 로고
    • Information security management: The second generation
    • von Solms, R. (1996). Information security management: the second generation, Computers & Security, 15: No.4, pp. 281-288.
    • (1996) Computers & Security , vol.15 , Issue.4 , pp. 281-288
    • Von Solms, R.1
  • 21
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding the threats to information security
    • Whitman, M. E. (2004). In defense of the realm: Understanding the threats to information security. International Journal of Information Management, 24: 43-57.
    • (2004) International Journal of Information Management , vol.24 , pp. 43-57
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.