메뉴 건너뛰기




Volumn , Issue , 2009, Pages 71-74

Security compliance: The next frontier in security research

Author keywords

Compliance; Economics; Security

Indexed keywords

COMPLIANCE; IT SECURITY; MARKET PLACE; NEW DIRECTIONS; PRACTICAL SOLUTIONS; REAL-WORLD; RESEARCH CHALLENGES; SECURITY COMPLIANCE; SECURITY REQUIREMENTS; SECURITY RESEARCH; SECURITY THREATS;

EID: 77950592910     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1595676.1595687     Document Type: Conference Paper
Times cited : (25)

References (18)
  • 4
    • 0003969633 scopus 로고
    • Anonymous, Department of Defense , on
    • Anonymous, Trusted Computer System Evaluation Criteria, Department of Defense , on http://csrc.nist.gov/publications/history/dod85.pdf, 1985.
    • (1985) Trusted Computer System Evaluation Criteria
  • 9
    • 0033325475 scopus 로고    scopus 로고
    • Experiments with Quantitative Evaluation Tools for Monitoring Operational Security
    • R. Ortalo, Y. Deswarte, and M. Kaaniche, Experiments with Quantitative Evaluation Tools for Monitoring Operational Security, IEEE Transactions on Software Engineering, 25(5), 1999, pages 633-650.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 14
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • The European Parliament, No L.
    • The European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities, 1995 No L. 281 page 31.
    • (1995) Official Journal of the European Communities , vol.281 , pp. 31
  • 16
    • 77950555242 scopus 로고    scopus 로고
    • Building Trust in Computing - Enterprise Security Perspective
    • M. Waidner, Building Trust in Computing - Enterprise Security Perspective, IST Conference, 2004, The Hague.
    • IST Conference, 2004, the Hague
    • Waidner, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.