-
1
-
-
71949109544
-
Annex 1B requirements for construction, testing, installation and inspection
-
Commission Regulation No. 1360/2002 on recording equipment in road transport
-
Commission Regulation No. 1360/2002 on recording equipment in road transport, Annex 1B Requirements for Construction, Testing, Installation and Inspection, Official Journal of the European Communities, L 207, (2002), 204-252
-
(2002)
Official Journal of the European Communities
, vol.207
, pp. 204-252
-
-
-
2
-
-
71949112934
-
-
ISO/IEC 15408 Common Criteria for IT security evaluation
-
ISO/IEC 15408 Common Criteria for IT security evaluation
-
-
-
-
4
-
-
71949092877
-
-
http://www.emag.pl/
-
-
-
-
5
-
-
71949093608
-
-
Common Criteria portal
-
Common Criteria portal, http://www.commoncriteriaportal.org/
-
-
-
-
6
-
-
70350138685
-
Security-related design patterns for intelligent sensors requiring measurable assurance
-
Bialas A., Security-related design patterns for intelligent sensors requiring measurable assurance, Przegla̧d Elektrotechniczny (Electrical Review), 85 (2009), nr 7, 92-99.
-
(2009)
Przegla̧d Elektrotechniczny (Electrical Review)
, vol.85
, Issue.7
, pp. 92-99
-
-
Bialas, A.1
-
7
-
-
33845468685
-
Ontology development 101: A guide to creating your first ontology
-
Noy N. F., McGuiness D. L., Ontology Development 101: A Guide to Creating Your First Ontology, Knowledge Systems Laboratory (2001) www-ksl.stanford.edu/ people/dlm/papers/ontology-tutorial-noymcguinness-abstract.html
-
(2001)
Knowledge Systems Laboratory
-
-
Noy, N.F.1
McGuiness, D.L.2
-
8
-
-
71949122622
-
-
Improving Automotive Security by Evaluation
-
Improving Automotive Security by Evaluation - From Security Health Check to Common Criteria (2004), http://www.srcgmbh.de/whitepapers/automotive- security-amendola.pdf
-
(2004)
From Security Health Check to Common Criteria
-
-
-
9
-
-
39749174383
-
How to develop secure it products using Common criteria, engineering management conference
-
Eriksson M., Konsult I., How to develop secure IT products using Common Criteria, Engineering Management Conference, IEEE International (2006), 297-299
-
(2006)
IEEE International
, pp. 297-299
-
-
Eriksson, M.1
Konsult, I.2
-
10
-
-
35348972943
-
Embedded security in a pervasive world
-
Paar Ch., Weimerskirch A., Embedded security in a pervasive world, Information Security Technical Report, vol. 12 (2007), Issue 3, 155-161
-
(2007)
Information Security Technical Report
, vol.12
, Issue.3
, pp. 155-161
-
-
Paar, C.H.1
Weimerskirch, A.2
-
11
-
-
84889785732
-
A review of the digital tachograph system
-
Springer Berlin Heidelberg
-
Furgel I., Lemke K., A Review of the Digital Tachograph System, In: Embedded Security in Cars, Springer Berlin Heidelberg (2006), 69-94
-
(2006)
Embedded Security in Cars
, pp. 69-94
-
-
Furgel, I.1
Lemke, K.2
-
12
-
-
71949114340
-
-
Security Target IS2000 Smartach SRES, P206412, Actia, Toulouse
-
Security Target IS2000 Smartach SRES, P206412, (2005), Actia, Toulouse
-
(2005)
-
-
-
13
-
-
71949126755
-
-
Security Target EFAS-3 V01 Digital Tachograph device, -, EFKONmobility GmbH
-
Security Target EFAS-3 V01 Digital Tachograph device, - (2008), EFKONmobility GmbH
-
(2008)
-
-
-
15
-
-
36249017853
-
-
New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H-, Eloff, M-, Labuschagne, L, Eloff, J., von Solms, R., Boston: Springer
-
Ekelhart A., Fenz, S., Goluch, G., and Weippl, E., Ontological Mapping of Common Criteria's Security Assurance Requirements, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H-, Eloff, M-, Labuschagne, L, Eloff, J., von Solms, R., Boston: Springer (2007), 85-95
-
(2007)
Ontological Mapping of Common Criteria's Security Assurance Requirements
, pp. 85-95
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Weippl, E.4
-
17
-
-
62749155242
-
Security ontology for annotating resources
-
Washington
-
Kim A., Luo J., Kang M., Security Ontology for Annotating Resources, Naval Research Laboratory, Washington, (2005), http://chacs.nrl.navy.mil/ publications/CHACS/2005/2005kim- NRLOntologyFinal.pdf
-
(2005)
Naval Research Laboratory
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
18
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
Auckland, LNCS, Springer Berlin/Heidelberg
-
th Int. Conf. on Conceptual Modeling, Auckland, 2007, LNCS, Springer Berlin/Heidelberg, (2008), 375-390
-
(2007)
th Int. Conf. on Conceptual Modeling
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
19
-
-
39749101462
-
Security ontologies: Improving quantitative risk analysis
-
Big Island, Hawaii, IEEE Computer Society Press
-
th Hawaii Int. Conf. on System Sciences, Big Island, Hawaii, IEEE Computer Society Press (2007), 156-162
-
(2007)
th Hawaii Int. Conf. on System Sciences
, pp. 156-162
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
21
-
-
36049040298
-
Semiformal approach to the it security development
-
Zamojski W., Mazurkiewicz J., Sugier J., Walkowiak T., Los Alamitos, Washington, Tokyo, ISBN 0-7695-2850-3
-
Bialas A., Semiformal Approach to the IT Security Development, In: Zamojski W., Mazurkiewicz J., Sugier J., Walkowiak T., Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX, IEEE Comp. Society, Los Alamitos, Washington, Tokyo (2007), ISBN 0-7695-2850-3, 3-11
-
(2007)
Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX, IEEE Comp. Society
, pp. 3-11
-
-
Bialas, A.1
-
22
-
-
70350143738
-
Semiformal Common Criteria compliant it security development framework
-
Number 2B 77, Silesian Univ. of Technology Press, Gliwice
-
Bialas A., Semiformal Common Criteria Compliant IT Security Development Framework, Studia Informatica, vol. 29 (2008) Number 2B (77), Silesian Univ. of Technology Press, Gliwice, www.znsi.aei. Polsl.pl/
-
(2008)
Studia Informatica
, vol.29
-
-
Bialas, A.1
-
23
-
-
71949103827
-
-
Protégé Ontology Editor and Knowledge Acquisition System, Stanford University
-
Protégé Ontology Editor and Knowledge Acquisition System, Stanford University, http://protege.stanford.edu/
-
-
-
-
24
-
-
62749100602
-
Ontology-based approach to the Common Criteria compliant it security development
-
SAM'08, Las Vegas
-
Bialas A., Ontology-based Approach to the Common Criteria Compliant IT Security Development, In: Proceedings of the 2008 Int. Conf. on Security and Management - SAM'08, Las Vegas (2008), 586-592
-
(2008)
Proceedings of the 2008 Int. Conf. on Security and Management
, pp. 586-592
-
-
Bialas, A.1
-
25
-
-
70449650807
-
Ontology-based security problem definition and solution for the Common Criteria compliant development process
-
IEEE Computer Society, Los Alamitos, Washington, Tokyo
-
Bialas A., Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process In: Proc. of the Int. Conf. on Dependability of Comp. Systems DepCoS-RELCOMEX'2009, IEEE Computer Society (2009), Los Alamitos, Washington, Tokyo, 3-10
-
(2009)
Proc. of the Int. Conf. on Dependability of Comp. Systems DepCoS-RELCOMEX'2009
, pp. 3-10
-
-
Bialas, A.1
-
26
-
-
71949098115
-
-
Guidelines for Developer Documentation according to Common Criteria Version 3.1
-
Guidelines for Developer Documentation according to Common Criteria Version 3.1, Bundesamt für Sicherheit in der Informationstechnik (2007)
-
(2007)
Bundesamt Für Sicherheit in Der Informationstechnik
-
-
-
27
-
-
58049144509
-
Implementacja sieci M2M w przyrza̧dzie wirtualnym
-
Maśnicki R., Implementacja sieci M2M w przyrza̧dzie wirtualnym, Przegla̧d Elektrotechniczny, 84 (2008), nr 12, 308-311
-
(2008)
Przegla̧d Elektrotechniczny
, vol.84
, Issue.12
, pp. 308-311
-
-
Maśnicki, R.1
-
28
-
-
58049135628
-
Electromagnetic field and home monitoring in cardiac device technology
-
Pławniak-Mowna A., Krawczyk A., Duraj A., Electromagnetic Field and Home Monitoring In Cardiac Device Technology, Przegla̧d Elektrotechniczny, 84 (2008), nr 12, 224-226
-
(2008)
Przegla̧d Elektrotechniczny
, vol.84
, Issue.12
, pp. 224-226
-
-
Pławniak-Mowna, A.1
Krawczyk, A.2
Duraj, A.3
|