메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 405-411

An AHP-based framework for quality and security evaluation

Author keywords

[No Author keywords available]

Indexed keywords

EVALUATION FRAMEWORK; META MODEL; SECURITY EVALUATION; SERVICE FUNCTIONALITIES;

EID: 70849094182     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.391     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 2
    • 33646025538 scopus 로고    scopus 로고
    • An innovative policybased cross certification methodology for public key infrastructures
    • Lecture Notes in Computer Science, Springer-Verlag
    • V. Casola, A. Mazzeo, N. Mazzocca, M. Rak, "An innovative Policybased Cross Certification methodology for Public Key Infrastructures" , proc. of the 2nd European PKI Workshop: Research and Applications, EuroPKI 2005. Pp. 100-117. Lecture Notes in Computer Science, Springer-Verlag.
    • (2005) Proc. of the 2nd European PKI Workshop: Research and Applications, EuroPKI , pp. 100-117
    • Casola, V.1    Mazzeo, A.2    Mazzocca, N.3    Rak, M.4
  • 6
    • 0003969633 scopus 로고
    • DoD (Department of Defense), ", ", 26 December, (Orange Book
    • DoD (Department of Defense), "Trusted Computer System Evaluation Criteria", 26 December 1985 (Orange Book). European Communities - Commission. ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg 1991
    • (1985) Trusted Computer System Evaluation Criteria
  • 12
    • 70849136665 scopus 로고    scopus 로고
    • available at
    • QME: a Quality Model Editor, available at: http://www.seclab.unina.it/ uploads/publications/QME.zip.
    • QME: A Quality Model Editor
  • 13
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • Ontario, Canada
    • R. Ronda, R. Henning, "Security Service Level Agreements: Quantifiable Security for the Enterprise?", ACM proc. of New Security Paradigm Workshop 1999, Ontario, Canada. Pp.54-60.
    • (1999) ACM Proc. of New Security Paradigm Workshop , pp. 54-60
    • Ronda, R.1    Henning, R.2
  • 14
    • 0025700933 scopus 로고
    • How to make a decision: The analytic hierarchy process
    • Elsevier
    • T.L. Saaty, "How to make a decision: the analytic hierarchy process", European Journal of Operational Research, 1990. Vol. 48, n.1, Elsevier, pp. 9- 26.
    • (1990) European Journal of Operational Research , vol.48 , Issue.1 , pp. 9-26
    • Saaty, T.L.1
  • 16
    • 70849124137 scopus 로고    scopus 로고
    • February, Available at
    • W3C Working Group. Web Services Architecture, Note 11 February 2004. Available at http://www.w3.org/TR/ws-arch/.
    • (2004) Web Services Architecture, Note , vol.11
  • 17
    • 57349099752 scopus 로고    scopus 로고
    • version 2005/09. Available at, WS-Policy specification. Web Services Policy Framework, April 2006. Available at http://www.w3.org/Submission/WS- Policy/
    • WS-Agreements specification. Web Services Agreement Specification, version 2005/09. Available at http://www.gridforum.org/Public-Comment-Docs/ Documents/Oct-2005/WSAgreementSpecificationDraft050920. pdf.
    • Web Services Agreement Specification
  • 19
    • 70849111335 scopus 로고    scopus 로고
    • WS-trust specification
    • Available at
    • WS-Trust specification. Web Services Trust Language. Available at http://specs.xmlsoap.org/ws/2005/02/trust/WS-Trust.pdf.
    • Web Services Trust Language
  • 20
    • 27844542141 scopus 로고    scopus 로고
    • Tradeoff and sensitivity analysis in software architecture evaluation using analytic hierarchy process
    • Springer Netherlands,/December
    • L. Zhu, A. Aurum, I. Gorton and R. Jeffery, "Tradeoff and Sensitivity Analysis in Software Architecture Evaluation Using Analytic Hierarchy Process", Software Quality Journal, Springer Netherlands, Volume 13, Number 4/December, 2005.
    • (2005) Software Quality Journal , vol.13 , Issue.4
    • Zhu, L.1    Aurum, A.2    Gorton, I.3    Jeffery, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.