메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-236

Managing information systems security and privacy

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84892804004     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/3-540-28104-5     Document Type: Book
Times cited : (37)

References (378)
  • 14
    • 0346358776 scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Digital Corporation, Palo Alto
    • Abadi M., Needham R.: Prudent Engineering Practice for Cryptographic Protocols. SRC Research Report No. 125, Digital Corporation, Palo Alto (1994)
    • (1994) SRC Research Report No. 125
    • Abadi, M.1    Needham, R.2
  • 19
    • 0030679849 scopus 로고    scopus 로고
    • A Public-key cryptosystem with worst-case / average-case equivalence
    • New York
    • Ajtai M., Dwork C: A Public-Key Cryptosystem with Worst-Case / Average-Case Equivalence. Proceedings of the 29th ACM STOC, ACM, New York (1997)
    • (1997) thACM STOC, ACM
    • Ajtai, M.1    Dwork, C.2
  • 20
    • 0038579798 scopus 로고    scopus 로고
    • International legal aspects of cryptography
    • Elsevier
    • Aljifri H., Sanchez D. N.: International Legal Aspects of Cryptography. Computers & Security, Vol. 22, No. 3, pp. 196-203, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.3 , pp. 196-203
    • Aljifri, H.1    Sanchez, D.N.2
  • 21
    • 84892823372 scopus 로고    scopus 로고
    • ATIS Committee T1A1, Ref, Gaithersburg. Tl.523-2001
    • Alliance for Telecommunications Industry Solutions: ATIS Telecom Glossary 2000, ATIS Committee T1A1, Ref. Tl.523-2001, NIST, Gaithersburg, (2001), http://www.atis.org/tg2k
    • (2001) NIST
  • 22
    • 0038443107 scopus 로고    scopus 로고
    • A New taxonomy of web attacks suitable for efficient encoding
    • Elsevier
    • Alvarez G., Petrović S.: A New Taxonomy of Web Attacks Suitable for Efficient Encoding. Computers & Security, Vol. 22, No. 5, pp. 435-449, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 435-449
    • Alvarez, G.1    Petrović, S.2
  • 23
    • 4944238084 scopus 로고
    • American National Standards Institute, Standard X9.17, Washington D.C.
    • American National Standards Institute: Financial Institution Key Management (Wholesale). Standard X9.17, Washington D.C., (1985)
    • (1985) Financial Institution Key Management (Wholesale)
  • 25
    • 43149116934 scopus 로고    scopus 로고
    • Preliminary system dynamics maps of the insider cyber threat problem
    • John Wiley & Sons, Oxford
    • Anderson D. et al.: Preliminary System Dynamics Maps of the Insider Cyber Threat Problem. John Wiley & Sons, Proceedings of the 22nd Conference of the SDS, Oxford, (2004)
    • (2004) nd Conference of the SDS
    • Anderson, D.1
  • 31
    • 33745186968 scopus 로고    scopus 로고
    • Association of Chief Police Officers. Computer Crime Group, London
    • Association of Chief Police Officers :Good Practice Guide for Computer Based Evidence. Computer Crime Group, London, (2003)
    • (2003) Good Practice Guide for Computer Based Evidence
  • 32
    • 0036832911 scopus 로고    scopus 로고
    • Breakthrough in privacy concerns and lawful access conflicts
    • Elsevier
    • Ayoade J. O., Kosuge T.: Breakthrough in Privacy Concerns and Lawful Access Conflicts. Telematics and Informatics, Vol. 19, No. 4, pp. 273-289, Elsevier, (2002)
    • (2002) Telematics and Informatics , vol.19 , Issue.4 , pp. 273-289
    • Ayoade, J.O.1    Kosuge, T.2
  • 33
    • 0038703578 scopus 로고    scopus 로고
    • Baker & Mc Kenzie, Chicago
    • Baker & Mc Kenzie: Global E-Commerce Law. Baker & Mc Kenzie, Chicago, (2002), http://www.bmck.com/ecommerce/intlegis-t.htm
    • (2002) Global E-Commerce Law
  • 34
    • 24944558281 scopus 로고    scopus 로고
    • The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS algorithms
    • Reston
    • Baldwin R., Rivest R.: The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. IETF RFC 2040, Reston, (1996)
    • (1996) IETF RFC , vol.2040
    • Baldwin, R.1    Rivest, R.2
  • 35
    • 33846668743 scopus 로고    scopus 로고
    • Penetration and social engineering - Hacking the weakest link
    • Elsevier
    • Barrett N.: Penetration and Social Engineering - Hacking the Weakest Link. Information Security Technical Report, Vol. 8, No. 4. pp. 56-64, Elsevier, (2003)
    • (2003) Information Security Technical Report , vol.8 , Issue.4 , pp. 56-64
    • Barrett, N.1
  • 39
  • 40
    • 84979807255 scopus 로고    scopus 로고
    • Eu data protection policy
    • Elsevier
    • Bergkamp L.: EU Data Protection Policy. Computer Law & Security, Vol. 18, No. 1. pp. 31-47, Elsevier, (2002)
    • (2002) Computer Law & Security , vol.18 , Issue.1 , pp. 31-47
    • Bergkamp, L.1
  • 41
    • 84892811114 scopus 로고    scopus 로고
    • Calculated risk
    • Online, December 2002, CXO Media Inc., Framingham
    • Berinato S.: Calculated Risk. CSO Online, December 2002, CXO Media Inc., Framingham, (2002), http://www.csoonline.com/read/120902/calculate.html
    • (2002) CSO
    • Berinato, S.1
  • 42
    • 0003272324 scopus 로고    scopus 로고
    • Uniform Resource Identifiers (URI) -generic syntax
    • Reston
    • Berners-Lee T, Fielding R., Masinter L.: Uniform Resource Identifiers (URI) -Generic Syntax. IETF RFC 2396 Reston (1998)
    • (1998) IETF RFC , vol.2396
    • Berners-Lee, T.1    Fielding, R.2    Masinter, L.3
  • 45
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • SIAM
    • Blum M., Micali S.: How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. Journal on Computing, Vol. 13., No. 4., pp. 850-864, SIAM, (1984)
    • (1984) Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 46
    • 0022716288 scopus 로고
    • A Simple unpredictable pseudo-random number generator
    • SIAM
    • Blum L., Blum M., Shub M.: A Simple Unpredictable Pseudo-Random Number Generator. Journal on Computing, Vol. 15, No. 2, pp. 364-383, SIAM, (1986)
    • (1986) Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 47
    • 0141972446 scopus 로고    scopus 로고
    • Security analysis of XML usage and XML parsing
    • Elsevier
    • Blyth A., CunlifFe D., Sutherland I.: Security Analysis of XML Usage and XML Parsing. Computers & Security, Vol. 22, No. 6, pp. 494-505, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 494-505
    • Blyth, A.1    Cunliffe, D.2    Sutherland, I.3
  • 48
    • 85088759149 scopus 로고
    • Collisions for the compress functions of md5
    • Springer Verlag, Heidelberg
    • Boer B., Bosselaers A.: Collisions for the Compress Functions of MD5. Euro-crypt '93 Lecture Notes in Computer Science, Vol; 773, pp. 294-304, Springer Verlag, Heidelberg, (1993)
    • (1993) Euro-crypt '93 Lecture Notes in Computer Science , vol.773 , pp. 294-304
    • Boer, B.1    Bosselaers, A.2
  • 49
    • 34247550528 scopus 로고    scopus 로고
    • From System Dynamics and Discrete Event to Practical Agent Based Modelling - Reasons Techniques Tools
    • John Wiley & Sons, Oxford
    • Borshchev A., Filippov A.: From System Dynamics and Discrete Event to Practical Agent Based Modelling - Reasons, Techniques, Tools. John Wiley & Sons, Proceedings of the 22nd Conference of the SDS, Oxford, (2004)
    • (2004) nd Conference of the SDS
    • Borshchev, A.1    Filippov, A.2
  • 51
    • 0027612025 scopus 로고
    • Security Architectures Using formal Methods
    • IEEE
    • Boyd C: Security Architectures Using formal Methods. IEEE Journal on Selected Areas in Communications, Vol. 11, No. 3, pp. 694-701, IEEE, (1993)
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.3 , pp. 694-701
    • Boyd, C.1
  • 52
    • 0038688046 scopus 로고    scopus 로고
    • The origins and the development of the ASM method for high level system design and analysis
    • Graz
    • Börger E.: The Origins and the Development of the ASM Method for High Level System Design and Analysis. Journal of Universal Computer Science, Vol. 8, No. 1, pp. 2-74, Graz, (2002)
    • (2002) Journal of Universal Computer Science , vol.8 , Issue.1 , pp. 2-74
    • Börger, E.1
  • 57
    • 11844282456 scopus 로고    scopus 로고
    • British Standards Institute: BSI, BS 7799-2, London
    • British Standards Institute: Information Security Management Systems. BSI, BS 7799-2, London, (2002)
    • (2002) Information Security Management Systems
  • 60
    • 0004215976 scopus 로고
    • Logic of authentication
    • Digital Equipment Corporation - DEC
    • Burrows M., Abadi M., Needham R.: Logic of Authentication. SRC Research Report Number 39, Digital Equipment Corporation - DEC, (1989), http://gatekeeper.research.compaq.com/pub/DEC/SRC/research-reports/abstracts/ src-rr-039.html
    • (1989) SRC Research Report Number 39
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 62
    • 84979797869 scopus 로고    scopus 로고
    • Adequate Security - What Exactly Do You Mean?
    • Elsevier
    • Buzzard K.: Adequate Security - What Exactly Do You Mean? Computer Law & Security, Vol. 19, No. 5, pp. 406-410, Elsevier, (2003)
    • (2003) Computer Law & Security , vol.19 , Issue.5 , pp. 406-410
    • Buzzard, K.1
  • 66
    • 84979819463 scopus 로고    scopus 로고
    • Data Protection - Security/Data Security - The Key to Privacy
    • Elsevier
    • Carey P., Rüssel C: Data Protection - Security/Data Security - The Key to Privacy. Computer Law & Security Report, Vol. 18, No. 2, pp. 112-113, Elsevier, (2002)"
    • (2002) Computer Law & Security Report , vol.18 , Issue.2 , pp. 112-113
    • Carey, P.1    Rüssel, C.2
  • 67
    • 84892796223 scopus 로고    scopus 로고
    • Center for Democracy & Technology. Center for Democracy & Technology, Washington D.C
    • Center for Democracy & Technology: Anti-Spyware Legislation on Fast Track Through House. Center for Democracy & Technology, Washington D.C., (2004), http: //www.cdt.org/privacy/spy ware/
    • (2004) Anti-Spyware Legislation on Fast Track Through House
  • 68
    • 34249040787 scopus 로고    scopus 로고
    • CERT, Pittsburgh
    • CERT/CC: CERT/CC " Advisories. CERT, Pittsburgh, (2005), http: / / www xert.org/advisories/
    • (2005) CERT/CC Advisories
  • 70
    • 85057633068 scopus 로고    scopus 로고
    • Experiences of using pki to access a hospital information system by high street opticians
    • Chadwick D.W., Mundy D., New J.: Experiences of Using PKI to Access a Hospital Information System by High Street Opticians. Computer Communications, Vol. 26, No )
    • Computer Communications , vol.26
    • Chadwick, D.W.1    Mundy, D.2    New, J.3
  • 72
    • 3342911529 scopus 로고    scopus 로고
    • SAMS Publishing Indianapolis
    • Chase N.: XML Primer Plus. SAMS Publishing, Indianapolis, (2003)
    • (2003) XML Primer Plus
    • Chase, N.1
  • 74
    • 0022145479 scopus 로고
    • Security without identification - Transaction systems to make the big brother obsolete
    • New York
    • Chaum D.: Security Without Identification - Transaction Systems to Make the big Brother Obsolete. Communications of the ACM, Vol. 28, No. 10, pp. 10301044, New York, (1985)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 10301044
    • Chaum, D.1
  • 76
    • 26444601400 scopus 로고
    • Online cash checks
    • Springer Verlag
    • Chaum D.: Online Cash Checks. Proceedings of Eurocrypt '89, pp. 288-293, Springer Verlag, (1990)
    • (1990) Proceedings of Eurocrypt '89 , pp. 288-293
    • Chaum, D.1
  • 81
    • 0003587590 scopus 로고    scopus 로고
    • W3C REC-xpath-19991116, Cambridge / Sophia Antipolis / Kanagawa
    • Clark J., DeRose S.: XML Path Language (XPath) v 1.0. W3C REC-xpath-19991116, Cambridge / Sophia Antipolis / Kanagawa, (1999), http://www.w3.org/TR/1999/REC-xpath-19991116
    • (1999) XML Path Language (XPath), v 1.0
    • Clark, J.1    Derose, S.2
  • 82
    • 0003420124 scopus 로고    scopus 로고
    • W3C REC-xslt-19991116, Cambridge / Sophia Antipolis / Kanagawa
    • Clark J.: XSL Transformations (XSLT) v 1.0. W3C REC-xslt-19991116, Cambridge / Sophia Antipolis / Kanagawa, (1999), http://www.w3.org/TR/1999/REC- xslt-19991116
    • (1999) XSL Transformations (XSLT) v 1.0
    • Clark, J.1
  • 85
    • 0142125896 scopus 로고    scopus 로고
    • Formal verification - An imperative step in the design of security protocols
    • Elsevier
    • Coffey T., Dojen R., Flanaga T.: Formal Verification - An Imperative Step in the Design of Security Protocols. Computer Networks, Vol. 2003, No. 43, pp. 601-618, Elsevier, (2003)
    • (2003) Computer Networks , vol.2003 , Issue.43 , pp. 601-618
    • Coffey, T.1    Dojen, R.2    Flanaga, T.3
  • 86
    • 0030701247 scopus 로고    scopus 로고
    • Information system attacks: A preliminary classification scheme
    • Elsevier
    • Cohen F.B.: Information System Attacks: A Preliminary Classification Scheme. Computers & Security, Vol. 16, No. 1, pp. 29-46, Elsevier, (1997)
    • (1997) Computers & Security , vol.16 , Issue.1 , pp. 29-46
    • Cohen, F.B.1
  • 87
    • 0141903338 scopus 로고    scopus 로고
    • Operationalizing IT risk management
    • Elsevier
    • Coles R.S., Moulton R.: Operationalizing IT Risk Management. Computers & Security, Vol. 22, No. 6, pp. 487-493, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 487-493
    • Coles, R.S.1    Moulton, R.2
  • 89
    • 0242724106 scopus 로고    scopus 로고
    • Society cannot function without privacy
    • IEEE
    • Coloyannides M.: Society Cannot Function Without Privacy. Security & Privacy, Vol. 2, No. 3, pp. 84-86, IEEE, (2003)
    • (2003) Security & Privacy , vol.2 , Issue.3 , pp. 84-86
    • Coloyannides, M.1
  • 91
    • 84892809327 scopus 로고
    • On the protection of personal data used for employment
    • Strasbourg
    • Council of Europe: On the Protection of Personal Data Used for Employment. Recommendation No. R (89) 2, Strasbourg, (1989), http://cm.coe.int/ta/rec/1989/89r2.htm
    • (1989) Recommendation No. R (89) 2
  • 92
    • 84892818670 scopus 로고    scopus 로고
    • Budapest
    • Council of Europe: CyberCrime Convention. ETS No. 185, Budapest, (2001), http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm
    • (2001) CyberCrime Convention. ETS No. 185
  • 93
    • 84892819243 scopus 로고    scopus 로고
    • P3P Guiding principles
    • Cambridge / Sophia Antipolis / Kanagawa
    • Crannor L.F. (editor): P3P Guiding Principles. W3C Recommendation NOTE-P3P10-principles-19980721, Cambridge / Sophia Antipolis / Kanagawa, (2002), http://www.w3.org/TR/1998/NOTE-P3P10-principles-19980721
    • (2002) W3C Recommendation NOTE-P3P10-principles-19980721
    • Crannor, L.F.1
  • 95
    • 1942537188 scopus 로고    scopus 로고
    • Computer forensics - Past present and future
    • Elsevier
    • Culley A.: Computer Forensics - Past, Present and Future. Information Security Technical Report, Vol. 8, No. 2, pp. 32-36, Elsevier, (2003)
    • (2003) Information Security Technical Report , vol.8 , Issue.2 , pp. 32-36
    • Culley, A.1
  • 97
    • 0141793000 scopus 로고    scopus 로고
    • Incident response
    • Elsevier
    • David J.: Incident Response. Network Security, Vol. 2003, No. 9. pp. 17-19, Elsevier, (2003)
    • (2003) Network Security , vol.2003 , Issue.9 , pp. 17-19
    • David, J.1
  • 99
    • 0030107190 scopus 로고    scopus 로고
    • A taxonomy for key escrow encryption systems
    • ACM
    • Denning D.E., Brandstad D.K.: A Taxonomy for Key Escrow Encryption Systems. Communications of the ACM, Vol. 39, No. 3, pp. 34-40, ACM, (1996)
    • (1996) Communications of the ACM , vol.39 , Issue.3 , pp. 34-40
    • Denning, D.E.1    Brandstad, D.K.2
  • 101
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • Elsevier
    • Der-Chyuan L., Jiang-Lung L.: Steganographic Method for Secure Communications. Computers & Security, Vol. 21, No. 5, pp. 449-460, Elsevier, (2002)
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 449-460
    • Der-Chyuan, L.1    Jiang-Lung, L.2
  • 102
    • 0032715216 scopus 로고    scopus 로고
    • Survival is Not Compulsory
    • Elsevier
    • Devargas M.: Survival is Not Compulsory. Computers & Security, Vol. 18, No. 1, pp. 35-46, Elsevier, (1999)
    • (1999) Computers & Security , vol.18 , Issue.1 , pp. 35-46
    • Devargas, M.1
  • 103
    • 0017018484 scopus 로고
    • New directions in cryptography
    • New York
    • Diffie W., Hellman M.: New Directions in Cryptography. Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, New York, (1976)
    • (1976) Transactions on Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 104
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the NBS data encryption standard
    • IEEE
    • Diffie W., Hellman M.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, Vol. 10, No. 6, pp. 74-84, IEEE, (1977)
    • (1977) Computer , vol.10 , Issue.6 , pp. 74-84
    • Diffie, W.1    Hellman, M.2
  • 107
    • 0001849866 scopus 로고    scopus 로고
    • The Status of MD5 after a Recent Attack
    • RS A Labs, Redwood City
    • Dobbertin H.: The Status of MD5 After a Recent Attack. CryptoBytes, Vol. 2, No. 3, pp. 1-6, RS A Labs, Redwood City, (1996)
    • (1996) CryptoBytes , vol.2 , Issue.3 , pp. 1-6
    • Dobbertin, H.1
  • 109
  • 114
    • 84892827215 scopus 로고    scopus 로고
    • Electronic privacy information center: Privacy law sourcebook
    • Washington D.C
    • Electronic Privacy Information Center: Privacy Law Sourcebook. EPIC, Washington D.C., (2001)
    • (2001) EPIC
  • 115
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • IEEE
    • ElGamal T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, IEEE, (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 117
    • 84892828614 scopus 로고
    • Data Protection Directive, 95/64/EC
    • European Commission L 281, 23/11/1995, Brussels
    • European Commission: Data Protection Directive, 95/64/EC. Official Journal of the European Communities, L 281, 23/11/1995, Brussels, (1995)
    • (1995) Official Journal of the European Communities
  • 118
    • 84892789395 scopus 로고    scopus 로고
    • Telecommunications Data Protection Directive, 97/66/EC
    • European Commission L 024, 30/1/1998, Brussels
    • European Commission: Telecommunications Data Protection Directive, 97/66/EC. Official Journal of the European Communities, L 024, 30/1/1998, Brussels, (1998)
    • (1998) Official Journal of the European Communities
  • 119
    • 84892796118 scopus 로고    scopus 로고
    • Setting up a Community Regime for the Control of Exports of Dual-use Items and Technology
    • European Commission L 159, 30/06/2000, Brussels
    • European Commission: Setting up a Community Regime for the Control of Exports of Dual-use Items and Technology. Official Journal of the European Communities, L 159, 30/06/2000, Brussels, (2000)
    • (2000) Official Journal of the European Communities
  • 120
    • 84892813257 scopus 로고    scopus 로고
    • Amending regulation with regard to intracommunity transfers and exports of dual-use items and technology
    • European Commission L 336, 30/12/2000, Brussels
    • European Commission: Amending Regulation with Regard to IntraCommunity Transfers and Exports of Dual-use Items and Technology. Official Journal of the European Communities, L 336, 30/12/2000, Brussels, (2000)
    • (2000) Official Journal of the European Communities
  • 121
    • 84892808808 scopus 로고    scopus 로고
    • A Community framework for electronic signatures, 1999/93/ec
    • European Commission L 013, 19/01/2000, Brussels
    • European Commission: A Community Framework for Electronic Signatures, 1999/93/EC. Official Journal of the European Communities, L 013, 19/01/2000, Brussels, (2000)
    • (2000) Official Journal of the European Communities
  • 122
    • 84892805061 scopus 로고    scopus 로고
    • Amending regulation with regard to the list of controlled dual-use items and technology when exported
    • European Commission L 065, 07/03/2001, Brussels
    • European Commission: Amending Regulation With Regard to the List of Controlled Dual-use Items and Technology When Exported. Official Journal of the European Communities, L 065, 07/03/2001, Brussels, (2001)
    • (2001) Official Journal of the European Communities
  • 123
    • 84892803090 scopus 로고    scopus 로고
    • Directive on the harmonization of certain aspects of copyright and related rights in the information society
    • European Commission L 167/10, 22/6/2001, Brussels
    • European Commission: Directive on the Harmonization of Certain Aspects of Copyright and Related Rights in the Information Society. Official Journal of the European Communities, L 167/10, 22/6/2001, Brussels, (2001)
    • (2001) Official Journal of the European Communities
  • 124
    • 84892783082 scopus 로고    scopus 로고
    • Privacy and Electronic Communications Directive, 02/58/EC
    • European Commission L201, 31/7/2002, Brussels
    • European Commission: Privacy and Electronic Communications Directive, 02/58/EC. Official Journal of the European Communities, L201, 31/7/2002, Brussels, (2002)
    • (2002) Official Journal of the European Communities
  • 125
    • 84892832829 scopus 로고    scopus 로고
    • Baseline security standards - Features and mechanisms
    • European Telecommunications Standards Institute Standard DTR/NA-002608, Sophia Antipolis
    • European Telecommunications Standards Institute: Baseline Security Standards - Features and Mechanisms. Security Techniques Advisory Group, Standard DTR/NA-002608, Sophia Antipolis, (1996)
    • (1996) Security Techniques Advisory Group
  • 127
    • 8444231043 scopus 로고    scopus 로고
    • W3C REC-xmlschema-0-20041028, Cambridge / Sophia Antipolis / Kanagawa
    • Fallside D.C., Walmsley P. (editors): XML Schema - Primer. W3C REC-xmlschema-0-20041028, Cambridge / Sophia Antipolis / Kanagawa, (2004), http://www.w3.org/TR/xmlschema-0/
    • (2004) XML Schema - Primer
    • Fallside, D.C.1    Walmsley, P.2
  • 128
    • 0037204573 scopus 로고    scopus 로고
    • Striking a balance between security and privacy
    • Elsevier
    • Farmer D.: Striking a Balance Between Security and Privacy. Card Technology Today, Vol. 14, No. 3, pp. 11-12, Elsevier, (2002)
    • (2002) Card Technology Today , vol.14 , Issue.3 , pp. 11-12
    • Farmer, D.1
  • 130
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • New York
    • Feistel H.: Cryptography and Computer Privacy. Scientific American, Scientific American, Vol. 228, No. 5, pp. 15-23, New York, (1973)
    • (1973) Scientific American Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 131
    • 84979792294 scopus 로고    scopus 로고
    • IT security outsourcing
    • Elsevier
    • Fenn C, Shooter R., Allan K.: IT Security Outsourcing. Computer Law & Security, Vol. 18, No. 2, pp. 109-111, Elsevier, (2002)
    • (2002) Computer Law & Security , vol.18 , Issue.2 , pp. 109-111
    • Fenn, C.1    Shooter, R.2    Allan, K.3
  • 134
    • 0002725436 scopus 로고
    • Industrial dynamics - A major breakthrough for decision makers
    • Cambridge
    • Forrester J.: Industrial Dynamics - A Major Breakthrough for Decision Makers. Harvard Business Review, Vol. 36, No. 4, pp. 37-66, Cambridge, (1958)
    • (1958) Harvard Business Review , vol.36 , Issue.4 , pp. 37-66
    • Forrester, J.1
  • 136
    • 0142216142 scopus 로고    scopus 로고
    • Biometrics - Future abuses
    • Elsevier
    • Forte D.: Biometrics - Future Abuses. Computer Fraud & Security, Vol. 2003, No. 10, pp. 12-14, Elsevier, (2004)
    • (2004) Computer Fraud & Security , vol.2003 , Issue.10 , pp. 12-14
    • Forte, D.1
  • 137
    • 1542491274 scopus 로고    scopus 로고
    • Foundation for Intellignet Agents. FIFA SC00023J, Geneva
    • Foundation for Intellignet Agents: FIPA Agent Management Specification. FIFA SC00023J, Geneva, (2002)
    • (2002) FIPA Agent Management Specification
  • 139
    • 26644472329 scopus 로고    scopus 로고
    • Secure Sockets Layer Protocol (version 3)
    • Mountain View
    • Freier, A.O., et al.: Secure Sockets Layer Protocol (version 3). Netscape Corp., Mountain View, (1996), http://wp.netscape.com/eng/ssl3/index.html
    • (1996) Netscape Corp.
    • Freier, A.O.1
  • 141
    • 0038365280 scopus 로고    scopus 로고
    • From common criteria to elliptic curves
    • ISO
    • Fumy W.: From Common Criteria to Elliptic Curves. ISO Bulletin, Vol. 2000, No. 6, pp. 20-25, ISO, (2000)
    • (2000) ISO Bulletin , vol.2000 , Issue.6 , pp. 20-25
    • Fumy, W.1
  • 142
    • 0042468094 scopus 로고    scopus 로고
    • A study on the certification of the information security management systems
    • Elsevier
    • Fung R.A., Farn K.J., Lin A.C.: A Study on the Certification of the Information Security Management Systems. Computer Standards & Interfaces, Vol. 2003, No. 25, pp. 447-461, Elsevier, (2003)
    • (2003) Computer Standards & Interfaces , vol.2003 , Issue.25 , pp. 447-461
    • Fung, R.A.1    Farn, K.J.2    Lin, A.C.3
  • 143
    • 0347380853 scopus 로고    scopus 로고
    • Risk Management is Still Where the Money Is
    • IEEE
    • Geer D.: Risk Management is Still Where the Money Is. Computer, Vol. 36, No. 12, pp. 129-131, IEEE, (2003)
    • (2003) Computer , vol.36 , Issue.12 , pp. 129-131
    • Geer, D.1
  • 144
    • 0035370581 scopus 로고    scopus 로고
    • Middleware challenges ahead
    • IEEE, Washington D.C
    • Geihs K.: Middleware Challenges Ahead, IEEE Computer, Volume 34, No. 6, pp. 24-31, IEEE, Washington D.C., (2001)
    • (2001) IEEE Computer , vol.34 , Issue.6 , pp. 24-31
    • Geihs, K.1
  • 145
    • 0042526856 scopus 로고    scopus 로고
    • Developing E-business trust
    • Gerberick D.: Developing E-business Trust. Security, Vol. 38, No. 9, pp. 37-40, ?, (2001)
    • (2001) Security , vol.38 , Issue.9 , pp. 37-40
    • Gerberick, D.1
  • 146
    • 0141610193 scopus 로고    scopus 로고
    • Cryptography and cryptographic protocols
    • Springer Verlag
    • Goldreich O.: Cryptography and Cryptographic Protocols. Distributed Computing, Vol. 16, No. 2-3, pp. 177-199, Springer Verlag, (2003)
    • (2003) Distributed Computing , vol.16 , Issue.2-3 , pp. 177-199
    • Goldreich, O.1
  • 148
    • 4344693676 scopus 로고    scopus 로고
    • Key recovery for the commercial environment
    • Springer Verlag, Heidelberg
    • Gonzales J. M. et al.: Key Recovery for the Commercial Environment. International Journal on Information Security, Vol. 1, No. 3, pp. 161-174, Springer Verlag, Heidelberg, (2002)
    • (2002) International Journal on Information Security , vol.1 , Issue.3 , pp. 161-174
    • Gonzales, J.M.1
  • 149
    • 79958717729 scopus 로고    scopus 로고
    • A framework for human factors in information security
    • HW/SW Codesign, E-Commerce and Computer Networks, Rio de Janeiro
    • Gonzalez J.J., Sawicka A.: A Framework for Human Factors in Information Security. Proceedings of the WSEAS Conference on Security, HW/SW Codesign, E-Commerce and Computer Networks, Rio de Janeiro, (2002)
    • (2002) Proceedings of the WSEAS Conference on Security
    • Gonzalez, J.J.1    Sawicka, A.2
  • 150
    • 84892826352 scopus 로고    scopus 로고
    • From modeling to managing security - A system dynamics approach
    • Kristiansand
    • Gonzalez J.J. (editor): From Modeling to Managing Security - A System Dynamics Approach. Hoyskole Forlaget AS, Kristiansand, (2003)
    • (2003) Hoyskole Forlaget AS
    • Gonzalez, J.J.1
  • 151
    • 84892793078 scopus 로고    scopus 로고
    • Government of Canada - Communications Security Establishment Government of Canada, Ottawa
    • Government of Canada - Communications Security Establishment: Canadian Handbook on Information Technology Security. Government of Canada, Ottawa, (1998)
    • (1998) Canadian Handbook on Information Technology Security
  • 152
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • IEEE
    • Grandison T., Sloman M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys, Vol. 2000, No. 4, pp. 2-13, IEEE, (2000)
    • (2000) IEEE Communications Surveys , vol.2000 , Issue.4 , pp. 2-13
    • Grandison, T.1    Sloman, M.2
  • 153
    • 0035480036 scopus 로고    scopus 로고
    • Binding telecooperation - A formal model for electronic commerce
    • Elsevier
    • Grimm R., Ochsenschläger P.: Binding Telecooperation - A Formal Model for Electronic Commerce. Computer Networks, Vol. 2001, No. 37, pp. 171-193, Elsevier, (2001)
    • (2001) Computer Networks , vol.2001 , Issue.37 , pp. 171-193
    • Grimm, R.1    Ochsenschläger, P.2
  • 154
    • 26444514264 scopus 로고    scopus 로고
    • REC-xptr-framework-20030325, Cambridge / Sophia Antipolis / Kanagawa
    • Grosso P., Maler E., Marsh J., Walsh N. (editors): XPointer Framework. W3C REC-xptr-framework-20030325, Cambridge / Sophia Antipolis / Kanagawa, (2003), http://www.w3.org/TR/2003/REC-xptr-framework-20030325
    • (2003) XPointer Framework. W3C
    • Grosso, P.1    Maler, E.2    Marsh, J.3    Walsh, N.4
  • 155
    • 0033157568 scopus 로고    scopus 로고
    • From active objects to autonomous agents
    • IEEE
    • Guessoum Z., Briot J.P.: From Active Objects to Autonomous Agents. IEEE Concurrency, Vol. 7, No. 3, pp. 68-76, IEEE, (1999)
    • (1999) IEEE Concurrency , vol.7 , Issue.3 , pp. 68-76
    • Guessoum, Z.1    Briot, J.P.2
  • 156
  • 157
    • 33745475725 scopus 로고    scopus 로고
    • Idea Group Inc., Hershey
    • Gupta J.N.D., Sharma S.K. (editors): Intelligent enterprises of the 21s4 century. Idea Group Inc., Hershey, (2004)
    • (2004) st Century
    • Gupta, J.N.D.1    Sharma, S.K.2
  • 158
    • 0036684150 scopus 로고    scopus 로고
    • PKI is not dead just resting
    • New York
    • Gutman P.: PKI Is Not Dead, Just Resting. IEEE Computer, Vol. 35, No. 8, pp. 41-49, New York, (2002)
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 41-49
    • Gutman, P.1
  • 159
    • 11144221306 scopus 로고    scopus 로고
    • W3C NOTE-ws-gloss-20040211, Cambridge / Sophia Antipolis / Kanagawa
    • Haas H. Brown A. (editors): Web Services Glossary. W3C NOTE-ws-gloss-20040211, Cambridge / Sophia Antipolis / Kanagawa, (2004). http://www.w3.Org/TR/2004/NOTE-ws-gloss-20040211/#securitymechanism
    • (2004) Web Services Glossary
    • Haas, H.1    Brown, A.2
  • 160
    • 0003048077 scopus 로고
    • The s/key one-time password system
    • San Diego
    • Haller N.M.: The S/Key One-Time Password System. Proceedings of the ISOC SNDSS, pp. 151-157, San Diego, (1994)
    • (1994) Proceedings of the ISOC SNDSS , pp. 151-157
    • Haller, N.M.1
  • 161
    • 84892823231 scopus 로고    scopus 로고
    • EU Update: Baker & mckenzies regular article tracking developments in eu law relating to ip it & telecommunications
    • Elsevier
    • Halliday D. et al.: EU Update: Baker & McKenzies Regular Article Tracking Developments in EU Law Relating to IP, IT & Telecommunications. Computer Law & Security Report, Vol. 19, No. 2, pp. 61-64, Elsevier, (2003)
    • (2003) Computer Law & Security Report , vol.19 , Issue.2 , pp. 61-64
    • Halliday, D.1
  • 162
    • 0036329258 scopus 로고    scopus 로고
    • The open source approach - Opportunities and limitations with respect to security and privacy
    • Elsevier
    • Hansen M., Kohntopp K., Pfitzmann A.: The Open Source Approach - Opportunities and Limitations With Respect to Security and Privacy. Computers & Security, Vol. 21, No. 5, pp. 461-471, Elsevier, (2002)
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 461-471
    • Hansen, M.1    Kohntopp, K.2    Pfitzmann, A.3
  • 164
    • 2342576368 scopus 로고    scopus 로고
    • Does cc paradigm have a future?
    • IEEE
    • Hearn J.: Does CC Paradigm Have a Future? Security & Privacy, Vol. 2004, No. 1, pp. 64-65, IEEE, (2004)
    • (2004) Ecurity & Privacy , vol.2004 , Issue.1 , pp. 64-65
    • Hearn, J.1
  • 166
    • 0038443128 scopus 로고    scopus 로고
    • Privacy legislation - A comparison of the us and eu approaches
    • Elsevier
    • Hinde S.: Privacy Legislation - A Comparison of the US and EU Approaches. Computers & Security, Vol. 22, No. 5, pp. 378-387, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 378-387
    • Hinde, S.1
  • 167
    • 0037530622 scopus 로고    scopus 로고
    • Careless about privacy
    • Elsevier
    • Hinde S.: Careless About Privacy. Computers & Security, Vol. 22, No. 4, pp. 284-288, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 284-288
    • Hinde, S.1
  • 171
    • 85015743862 scopus 로고    scopus 로고
    • Brainstorming products for the long-term future
    • Blackwell Publishing, Oxford
    • Hollins B.: Brainstorming Products for the Long-term Future. Creativity and Innovation Management, Vol. 8, No. 4, pp. 286-293, Blackwell Publishing, Oxford, (1999)
    • (1999) Creativity and Innovation Management , vol.8 , Issue.4 , pp. 286-293
    • Hollins, B.1
  • 175
    • 0036495835 scopus 로고    scopus 로고
    • Quantum cryptography latest - Promises to boost security within a decade but won't end the arms race
    • Elsevier
    • Hunter P.: Quantum Cryptography Latest - Promises to Boost Security Within a Decade but Won't End the Arms Race. Computer Fraud & Security, Vol. 2002, No. 3, pp. 14-15, Elsevier, (2002)
    • (2002) Computer Fraud & Security , vol.2002 , Issue.3 , pp. 14-15
    • Hunter, P.1
  • 176
    • 0346707578 scopus 로고    scopus 로고
    • Access control with role attribute certificates
    • Elsevier
    • Hwang J., Wu K., Liu D.: Access Control With Role Attribute Certificates. Computer Standards & Interfaces, Vol. 22, No. 1, pp. 43-53, Elsevier, (2000)
    • (2000) Computer Standards & Interfaces , vol.22 , Issue.1 , pp. 43-53
    • Hwang, J.1    Wu, K.2    Liu, D.3
  • 177
    • 16644392725 scopus 로고
    • Security defects in ccitt recommendation x.509
    • New York
    • I'Anson C, Mitchell C: Security Defects in CCITT Recommendation X.509. ACM SIGCOMM, Vol. 20, No. 2, pp. 30-40, New York, (1990)
    • (1990) ACM SIGCOMM , vol.20 , Issue.2 , pp. 30-40
    • I'Anson, C.1    Mitchell, C.2
  • 178
    • 1142264879 scopus 로고    scopus 로고
    • W3C REC-xmlenc-core-20021210 Cambridge / Sophia Antipolis / Kanagawa
    • Imamura T., Dillaway B., Simon E.: XML Encryption Syntax and Processing. W3C REC-xmlenc-core-20021210, Cambridge / Sophia Antipolis / Kanagawa, (2002), http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/
    • (2002) XML Encryption Syntax and Processing
    • Imamura, T.1    Dillaway, B.2    Simon, E.3
  • 179
    • 33644980178 scopus 로고    scopus 로고
    • International Labor Organization ILO Code of Practice, ILO, Geneva
    • International Labor Organization: Protection of Workers Personal Data. ILO Code of Practice, ILO, Geneva, (1997)
    • (1997) Protection of Workers Personal Data
  • 181
    • 0003767375 scopus 로고
    • Information processing systems - Open systems interconnection - Basic reference model
    • International Standards Organization, ISO 7498-2, Geneva
    • International Standards Organization: Information Processing Systems - Open Systems Interconnection - Basic Reference Model, Security Architecture, part 2. ISO 7498-2, Geneva, (1989)
    • (1989) Security Architecture , Issue.PART 2
  • 186
    • 84892783168 scopus 로고    scopus 로고
    • IT - Management of Information and Communications Technology Security
    • International Standards Organization ISO / IEC 13335-1, Geneva
    • International Standards Organization: IT - Management of Information and Communications Technology Security, Part 1: Concepts and Models for Information and Communications Technology Security Management. ISO / IEC 13335-1, Geneva, (2004)
    • (2004) Concepts and Models for Information and Communications Technology Security Management , Issue.PART 1
  • 187
    • 84892818317 scopus 로고    scopus 로고
    • IT - Guidelines for the Management of IT Security
    • International Standards Organization ISO / IEC TR 13335-2, Geneva
    • International Standards Organization: IT - Guidelines for the Management of IT Security, Part 2: Managing and Planning. ISO / IEC TR 13335-2, Geneva, (1997)
    • (1997) Managing and Planning , Issue.PART 2
  • 188
    • 84892790492 scopus 로고    scopus 로고
    • IT - Guidelines for the Management of IT Security
    • International Standards Organization ISO / IEC TR13335-3, Geneva
    • International Standards Organization: IT - Guidelines for the Management of IT Security, Part 3: Techniques for the Management of IT Security. ISO / IEC TR 13335-3, Geneva, (1998)
    • (1998) Techniques for the Management of IT Security , Issue.PART 3
  • 189
    • 84892781574 scopus 로고    scopus 로고
    • IT - Guidelines for the management of it security
    • International Standards Organization ISO / IEC TR 13335-4, Geneva
    • International Standards Organization: IT - Guidelines for the Management of IT Security, Part 4: Selection of Safeguards. ISO / IEC TR 13335-4, Geneva, (2000)
    • (2000) Selection of Safeguards , Issue.PART 4
  • 190
    • 84892784942 scopus 로고    scopus 로고
    • IT - Guidelines for the Management of IT Security
    • International Standards Organization ISO / IEC TR 13335-5, Geneva
    • International Standards Organization: IT - Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security. ISO / IEC TR 13335-5, Geneva, (2001)
    • (2001) Management Guidance on Network Security , Issue.PART 5
  • 193
    • 84892803348 scopus 로고    scopus 로고
    • IT - Security techniques - Hash-functions
    • International Standards Organization ISO 10118-3, Geneva
    • International Standards Organization: IT - Security techniques - Hash-functions - Part 3: Dedicated Hash Functions. ISO 10118-3, Geneva, (2003)
    • (2003) Dedicated Hash Functions , Issue.PART 3
  • 196
    • 84892801738 scopus 로고    scopus 로고
    • ISS Atlanta
    • Internet Security Systems: X-Force Web Archives. ISS, Atlanta, (2005), http://xforce.iss.net/
    • (2005) X-Force Web Archives
  • 197
    • 84892816362 scopus 로고    scopus 로고
    • ITU-T: IT - Open Systems Interconnection - The Directory Recommendation X.500, Geneva
    • ITU-T: IT - Open Systems Interconnection - The Directory: Overview of Concepts, Models and Services. Recommendation X.500, Geneva, (1997)
    • (1997) Overview of Concepts, Models and Services
  • 198
    • 84892793707 scopus 로고    scopus 로고
    • ITU-T: IT - Open Systems Interconnection - The Directory Geneva
    • ITU-T: IT - Open Systems Interconnection - The Directory - Public Key and Attribute Certificate Frameworks. X.509 v4, Geneva, (2000)
    • (2000) Public Key and Attribute Certificate Frameworks , vol.4 , pp. 509
  • 199
    • 1942537595 scopus 로고    scopus 로고
    • Could There Ever be a Unitary Digital Certificate?
    • Elsevier
    • Jaweed S.: Could There Ever be a Unitary Digital Certificate? Information Security Journal, Vol. 8, No. 3, pp. 36-44, Elsevier, (2003)
    • (2003) Information Security Journal , vol.8 , Issue.3 , pp. 36-44
    • Jaweed, S.1
  • 202
    • 0012497782 scopus 로고    scopus 로고
    • Elliptic curves and cryptography
    • CMP Media
    • Jurisic A., Menezes A.: Elliptic Curves and Cryptography. Dr. Dobb's Journal, Vol. 1997, No. 264, pp. 26-37, CMP Media, (1997)
    • (1997) Dr Dobb's Journal , vol.1997 , Issue.264 , pp. 26-37
    • Jurisic, A.1    Menezes, A.2
  • 203
    • 17444423290 scopus 로고    scopus 로고
    • Sociotechnical architecture for online privacy
    • IEEE
    • Jutla D.N., Bodorik P.: Sociotechnical Architecture for Online Privacy. Security & Privacy, Vol. 4, No. 2, pp. 29-39, IEEE, (2005)
    • (2005) Security & Privacy , vol.4 , Issue.2 , pp. 29-39
    • Jutla, D.N.1    Bodorik, P.2
  • 206
    • 1642394689 scopus 로고    scopus 로고
    • IBM, Cambridge / Sophia Antipolis / Kanagawa
    • Kaler C. (editor): Web Services Security (WS-Security), v 1.0. IBM, Cambridge / Sophia Antipolis / Kanagawa 2002, http://www-106.ibm.com/ developerworks/webservices/library/ws-secure
    • (2002) Web Services Security (WS-Security), v 1.0
    • Kaler, C.1
  • 211
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion Detection - A Brief History and Overview
    • IEEE
    • Kemmerer R.A., Vigna G.: Intrusion Detection - A Brief History and Overview. Security & Privacy, Vol. 35, No. 5, pp. 27-30, IEEE, (2002)
    • (2002) Security & Privacy , vol.35 , Issue.5 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 212
    • 84892785989 scopus 로고    scopus 로고
    • Auditing - The Future of IT Security
    • Elsevier
    • Kemp G.: Auditing - The Future of IT Security. Computer Fraud & Security, Vol. 2001, No. 10, pp. 15-18, Elsevier, (2001)
    • (2001) Computer Fraud & Security , vol.2001 , Issue.10 , pp. 15-18
    • Kemp, G.1
  • 214
    • 0034427834 scopus 로고    scopus 로고
    • The byte stops here - Duty and liability for negligent internet security
    • IEEE
    • Kenneally E.: The Byte Stops Here - Duty and Liability for Negligent Internet Security. IEEE Computer Security Journal, Vol. 16, No. 4, pp. 1-26, IEEE, (2000) "
    • (2000) IEEE Computer Security Journal , vol.16 , Issue.4 , pp. 1-26
    • Kenneally, E.1
  • 217
    • 0003315821 scopus 로고    scopus 로고
    • IP encapsulating security payload (ESP)
    • Reston
    • Kent S., Atkinson R.: IP Encapsulating Security Payload (ESP). IETF RFC 2406, Reston, (1998)
    • (1998) IETF RFC , vol.2406
    • Kent, S.1    Atkinson, R.2
  • 218
    • 0141458139 scopus 로고    scopus 로고
    • Threats and solutions to web services security
    • Elsevier
    • King S.: Threats and Solutions to Web Services Security. Network Security, Vol. 2003, No. 9, pp. 8-12, Elsevier (2003)
    • (2003) Network Security , vol.2003 , Issue.9 , pp. 8-12
    • King, S.1
  • 220
  • 225
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • ACM
    • Lamport L.: Password Authentication with Insecure Communication. Communications of ACM, Vol. 24, No. 11, pp. 770-772, ACM, (1981)
    • (1981) Communications of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 226
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • IEEE
    • Lampson B.: Computer Security in the Real World. Computer, Vol. 37, No. 6, pp. 37-46, IEEE, (2004)
    • (2004) Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.1
  • 227
    • 0042468088 scopus 로고    scopus 로고
    • Public key infrastructure - A micro and macro analysis
    • Elsevier
    • Lancaster S.: Public Key Infrastructure - A Micro and Macro Analysis. Computer Standards & Interfaces, Vol. 25. No. 5, pp. 437-446, Elsevier, (2003)
    • (2003) Computer Standards & Interfaces , vol.25 , Issue.5 , pp. 437-446
    • Lancaster, S.1
  • 228
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws
    • New York
    • Landwehr CE. et al.: A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, Vol. 26, No. 3, pp. 211-254, New York, (1994)
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1
  • 230
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behavior
    • Elsevier
    • Leach J.: Improving User Security Behavior. Computers & Security, Vol. 22, No. 8, pp. 685-692, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 232
    • 84892829794 scopus 로고    scopus 로고
    • Micropayments - An idea whose time has passed twice?
    • Elsevier
    • Lesk M.: Micropayments - An Idea Whose Time Has Passed Twice? Computers & Security, Vol. 3, No. 1, pp. 61-63, Elsevier, (2004)
    • (2004) Computers & Security , vol.3 , Issue.1 , pp. 61-63
    • Lesk, M.1
  • 233
    • 0003891936 scopus 로고    scopus 로고
    • W3C REC-CSS1-19990111, Cambridge / Sophia Antipolis / Kanagawa
    • Lie H., Bos B.: Cascading Style Sheets, level 1. W3C REC-CSS1-19990111, Cambridge / Sophia Antipolis / Kanagawa, (1999), http://www.w3.org/TR/1999/REC- CSSl-19990111
    • (1999) Cascading Style Sheets, Level 1
    • Lie, H.1    Bos, B.2
  • 234
    • 0035108586 scopus 로고    scopus 로고
    • A practical guide to biometrie security technology
    • IEEE
    • Liu S., Silverman M.: A Practical Guide to Biometrie Security Technology. IT Pro, Vol. 3, No. 1, pp. 27-32, IEEE, (2001)
    • (2001) IT Pro , vol.3 , Issue.1 , pp. 27-32
    • Liu, S.1    Silverman, M.2
  • 235
    • 0344034773 scopus 로고    scopus 로고
    • Security log management
    • Elsevier
    • Lobo C: Security Log Management. Network Security, Vol. 2003, No. 11, pp. 6-9, Elsevier, (2003)
    • (2003) Network Security , vol.2003 , Issue.11 , pp. 6-9
    • Lobo, C.1
  • 238
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and Authorization Infrastructures - A Comparative Survey
    • Elsevier
    • Lopez J., Oppliger R., Pernul G.: Authentication and Authorization Infrastructures - A Comparative Survey. Computers & Security, Vol. 23, No. 7, pp. 578-590, Elsevier, (2004)
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 241
    • 84979828719 scopus 로고    scopus 로고
    • Personal Privacy - Transatlantic Perspective
    • Elsevier
    • Manny H. C: Personal Privacy - Transatlantic Perspective. Computer Law & Security, Vol. 19, No. 1, pp. 4-10, Elsevier, (2003)
    • (2003) Computer Law & Security , vol.19 , Issue.1 , pp. 4-10
    • Manny, H.C.1
  • 242
    • 17844381888 scopus 로고    scopus 로고
    • Keyjacking - The surprising insecurity of client-side ssl
    • Elsevier
    • Marchesini J., Smith S.W., Zhao M.: Keyjacking - The Surprising Insecurity of Client-Side SSL. Computers & Security.Vol. 24, No. 2, pp. 109-123, Elsevier, (2005)
    • (2005) Computers & Security , vol.24 , Issue.2 , pp. 109-123
    • Marchesini, J.1    Smith, S.W.2    Zhao, M.3
  • 243
    • 84892805082 scopus 로고
    • MasterCard Cardholder Solutions, Draft standards, parts 1 through 4, St. Louis
    • MasterCard Cardholder Solutions: Secure Electronic Payment Protocol. Draft standards, parts 1 through 4, St. Louis, (1995), http://www.x5.net/faqs/ crypto/ql40.html
    • (1995) Secure Electronic Payment Protocol
  • 245
    • 0038519807 scopus 로고    scopus 로고
    • Dynamic corporate culture lies at the heart of effective security strategy
    • Elsevier
    • May C: Dynamic Corporate Culture Lies at the Heart of Effective Security Strategy. Computer Fraud & Security, Vol. 2003, No. 5, pp. 10-13, Elsevier, (2003)
    • (2003) Computer Fraud & Security , vol.2003 , Issue.5 , pp. 10-13
    • May, C.1
  • 247
    • 3242785761 scopus 로고    scopus 로고
    • Who is liable for insecure systems?
    • IEEE
    • Mead N. R.: Who Is Liable for Insecure Systems? IEEE Computer, Vol. 37, No. 7, pp. 27-34, IEEE, (2004)
    • (2004) IEEE Computer , vol.37 , Issue.7 , pp. 27-34
    • Mead, N.R.1
  • 250
    • 84979831163 scopus 로고    scopus 로고
    • Information privacy regulation: The eu model and the french model
    • Elsevier
    • Meunchinger E. N.: Information Privacy Regulation: The EU Model and the French Model. Computer Law & Security Report, Vol. 17, No. 6, pp. 390-394, Elsevier, (2001)
    • (2001) Computer Law & Security Report , vol.17 , Issue.6 , pp. 390-394
    • Meunchinger, E.N.1
  • 252
    • 84892817081 scopus 로고    scopus 로고
    • US to EU on Software Patents "we sold out, you should too"
    • Miller R.: US to EU on Software Patents: "We sold out, you should too". NewsForge, (2004), http://trends.newsforge.com/trends/04/06/09/.
    • (2004) NewsForge
    • Miller, R.1
  • 256
    • 22444435942 scopus 로고    scopus 로고
    • Increasing the capacity of companies to absorb inventions from research organizations and encouraging people to innovate
    • Taylor and Francis
    • Mulej M., Likar B.: Increasing the Capacity of Companies to Absorb Inventions from Research Organizations and Encouraging People to Innovate. Cybernetics and Systems, Vol. 36, No. 5, pp. 491-512, Taylor and Francis, (2005)
    • (2005) Cybernetics and Systems , vol.36 , Issue.5 , pp. 491-512
    • Mulej, M.1    Likar, B.2
  • 260
    • 84892798781 scopus 로고    scopus 로고
    • National Infrastructure Security Co-ordination Centre NISCC Technical Note 10/04, rev. 2, London
    • National Infrastructure Security Co-ordination Centre: Understanding Firewalls. NISCC Technical Note 10/04, rev. 2, London, (2005)
    • (2005) Understanding Firewalls
  • 261
    • 0003508564 scopus 로고
    • National Institute of Standards and Technology FIPS 186, Washington D.C.
    • National Institute of Standards and Technology: Digital Signature Standard -DSS. FIPS 186, Washington D.C., (1994)
    • (1994) Digital Signature Standard -DSS
  • 262
    • 0038562418 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST Special Publication 800-12, Washington D.C.
    • National Institute of Standards and Technology: An Introduction to Computer Security. NIST Special Publication 800-12, Washington D.C., (1996)
    • (1996) An Introduction to Computer Security
  • 263
    • 0003508568 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, FIPS PUB 46-3, Washington D.C.
    • National Institute of Standards and Technology: Data Encryption Standard. FIPS PUB 46-3, Washington D.C., (1999)
    • (1999) Data Encryption Standard
  • 264
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology FIPS PUB 197, Washington D.C
    • National Institute of Standards and Technology: Advanced Encryption Standard. FIPS PUB 197, Washington D.C., (2001)
    • (2001) Advanced Encryption Standard
  • 265
    • 33746911297 scopus 로고    scopus 로고
    • National Institute of Standards and Technology FIPS PUB 180-2, Washingotn D.C
    • National Institute of Standards and Technology: Secure Hash Signature Standard. FIPS PUB 180-2, Washingotn D.C., (2002)
    • (2002) Secure Hash Signature Standard
  • 266
    • 0013379958 scopus 로고    scopus 로고
    • National Institute of Standards and Technology / SEMATECH: NIST / SEMATECH, Gaithersburg / Austin
    • National Institute of Standards and Technology / SEMATECH: e-Handbook of Statistical Methods. NIST / SEMATECH, Gaithersburg / Austin, (2005), http://www.itl.nist.gov/div898/handbook/
    • (2005) E-Handbook of Statistical Methods
  • 267
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • ACM
    • Needham R.M., Schroeder M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, Vol. 21, No. 12, pp. 993-999, ACM, (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 268
    • 84892782217 scopus 로고    scopus 로고
    • Network World. Network World Inc., Southborough
    • Network World: Executive Guide to Wireless Security. Network World Inc., Southborough, (2005)
    • (2005) Executive Guide to Wireless Security
  • 269
    • 0028514601 scopus 로고
    • Kerberos - An authentication service for computer networks
    • IEEE
    • Neumann B.C., T'so T.: Kerberos - An Authentication Service for Computer Networks. IEEE Comm. Magazine, Vol. 32, No. 9, pp. 33-38, IEEE, (1994)
    • (1994) IEEE Comm. Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neumann, B.C.1    T'So, T.2
  • 272
    • 55849097497 scopus 로고    scopus 로고
    • Application to Application Web Services - Interactive Web Services
    • IT University of Copenhagen, Copenhagen
    • Niss H.: Application to Application Web Services - Interactive Web Services. Course materials, IT University of Copenhagen, Copenhagen, (2004), http://www.itu.dk/courses/IWSJ/E2004/slides/app2app.pdf
    • (2004) Course Materials
    • Niss, H.1
  • 275
    • 84892824175 scopus 로고    scopus 로고
    • Unified modeling language
    • Object Management Group OMG, Needham
    • Object Management Group: Unified Modeling Language. OMG Specification v 1.5, OMG, Needham, (2003)
    • (2003) OMG Specification v 1.5
  • 277
    • 0005456577 scopus 로고    scopus 로고
    • Organization for Economic Co-operation and Development. OECD, Paris
    • Organization for Economic Co-operation and Development: Guidelines for Cryptography Policy. OECD, Paris, (1997)
    • (1997) Guidelines for Cryptography Policy
  • 278
    • 84892815686 scopus 로고    scopus 로고
    • Implementing the OECD "privacy guidelines"
    • Organization for Economic Co-operation and Development Focus On The Internet. DSTI/ICCP/REG(97)6/FINAL, OECD, Paris
    • Organization for Economic Co-operation and Development: Implementing The OECD "Privacy Guidelines" In The Electronic Environment: Focus On The Internet. DSTI/ICCP/REG(97)6/FINAL, OECD, Paris, (1998)
    • (1998) The Electronic Environment
  • 280
    • 1942441439 scopus 로고    scopus 로고
    • PKI Needs good standards?
    • Elsevier
    • Palmer T.: PKI Needs Good Standards? Information Security Technical Report, Vol. 8, No. 3, pp. 6-13, Elsevier, (2003)
    • (2003) Information Security Technical Report , vol.8 , Issue.3 , pp. 6-13
    • Palmer, T.1
  • 281
    • 0035396467 scopus 로고    scopus 로고
    • P2P networking - An information sharing alternative
    • IEEE
    • Parameswaran M., et al.: P2P Networking - An Information Sharing Alternative. IEEE Computer, Vol. 34, No. 7, pp. 31-37, IEEE, (2001)
    • (2001) IEEE Computer , vol.34 , Issue.7 , pp. 31-37
    • Parameswaran, M.1
  • 283
    • 0142216143 scopus 로고    scopus 로고
    • Balancing the security budget
    • Elsevier
    • Pemble M.: Balancing the Security Budget. Computer Fraud & Security, Vol. 3, No. 10, pp. 8-11, Elsevier, (2003)
    • (2003) Computer Fraud & Security , vol.3 , Issue.10 , pp. 8-11
    • Pemble, M.1
  • 284
    • 0003724905 scopus 로고
    • Information systems security: Scope, state-of-the-art and evaluation of techniques
    • Elsevier
    • Pernul G.: Information Systems Security: Scope, State-of-the-art and Evaluation of Techniques. International Journal of Information Management, Vol. 15. No. 3, pp. 242-256, Elsevier, (1995)
    • (1995) International Journal of Information Management , vol.15 , Issue.3 , pp. 242-256
    • Pernul, G.1
  • 285
    • 1542335487 scopus 로고    scopus 로고
    • Non-pki methods for public key distribution
    • Elsevier
    • Peyravian M., Roginsky A., Zunic N.: Non-PKI Methods for Public Key Distribution. Computers & Security, Vol. 2004, No. 23, pp. 97-103, Elsevier, (2004)
    • (2004) Computers & Security , vol.2004 , Issue.23 , pp. 97-103
    • Peyravian, M.1    Roginsky, A.2    Zunic, N.3
  • 288
    • 0037282522 scopus 로고    scopus 로고
    • Some trends in research in cryptography and security mechanisms
    • Elsevier
    • Piper F.: Some Trends in Research in Cryptography and Security Mechanisms. Computers & Security, Vol. 22, No. 1, pp. 22-25, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 22-25
    • Piper, F.1
  • 295
    • 0142043280 scopus 로고    scopus 로고
    • Wireless Security policies
    • Elsevier
    • Potter B.: Wireless Security policies. Network Security, Vol. 2003, No. 10, pp. 10-12, Elsevier, (2003)
    • (2003) Network Security , vol.2003 , Issue.10 , pp. 10-12
    • Potter, B.1
  • 296
    • 0036299702 scopus 로고    scopus 로고
    • The emergence of a comprehensive obligation towards computer security
    • Elsevier
    • Pounder C: The Emergence of a Comprehensive Obligation Towards Computer Security. Computers & Security, Vol. 21., No. 4., pp. 328-332, Elsevier, (2002)
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 328-332
    • Pounder, C.1
  • 299
    • 84892827704 scopus 로고    scopus 로고
    • Preface to the special issue on security in global computing
    • Springer Verlag
    • Priami C: Preface to the Special Issue on Security in Global Computing. International Journal on Information Security, Vol. 2, No. 3-4, p. 125, Springer Verlag, (2004)
    • (2004) International Journal on Information Security , vol.2 , Issue.3-4 , pp. 125
    • Priami, C.1
  • 300
    • 0003367568 scopus 로고    scopus 로고
    • S/MIME version 3 message specification
    • Reston
    • Ramsdell B. (editor): S/MIME Version 3 Message Specification. IETF RFC 2633, Reston, (1999)
    • (1999) IETF RFC , vol.2633
    • Ramsdell, B.1
  • 302
    • 0037265822 scopus 로고    scopus 로고
    • Wireless lan security - Things you should know about wlan security
    • Elsevier
    • Regan K.: Wireless LAN Security - Things You Should Know About WLAN Security. Network Security, Vol. 03, No. 1, pp. 7-9, Elsevier, (2003)
    • (2003) Network Security , vol.3 , Issue.1 , pp. 7-9
    • Regan, K.1
  • 303
    • 0034955243 scopus 로고    scopus 로고
    • Extending the risk analysis model to include market-insurance
    • Elsevier
    • Reid C.R., Floyd S.A.: Extending the Risk Analysis Model to Include Market-Insurance. Computers & Security, Vol. 20, No. 4, pp. 331-339, Elsevier, (2001)
    • (2001) Computers & Security , vol.20 , Issue.4 , pp. 331-339
    • Reid, C.R.1    Floyd, S.A.2
  • 304
    • 84892794675 scopus 로고    scopus 로고
    • A Honeynet within the german network - Experiences and results
    • Springer Verlag, Heidelberg
    • Reiser H., Volker G.: A Honeynet within the German Network - Experiences and Results. Lecture Notes in Informatics, Vol. 46, pp. 113-128, Springer Verlag, Heidelberg, (2004)
    • (2004) Lecture Notes in Informatics , vol.46 , pp. 113-128
    • Reiser, H.1    Volker, G.2
  • 305
    • 0017930809 scopus 로고
    • A Method for obtaining digital signatures and public-key cryptosystems
    • ACM
    • Rivest R.L., Shamir A., Adleman L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21, No. 2, pp. 120-126, ACM, (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 307
    • 84979076059 scopus 로고    scopus 로고
    • Payword and micromint - Two simple micropayment schemes
    • Springer Verlag, Heidelberg
    • Rivest R., Shamir A.: PayWord and MicroMint - Two Simple Micropayment Schemes. Lecture Notes In Computer Science, Vol. 1189, pp. 69-87, Springer Verlag, Heidelberg, (1996)
    • (1996) Lecture Notes in Computer Science , vol.1189 , pp. 69-87
    • Rivest, R.1    Shamir, A.2
  • 308
    • 0038564853 scopus 로고    scopus 로고
    • The case against regulating encryption technology
    • New York
    • Rivest R.: The Case Against Regulating Encryption Technology. Scientific American, Vol. 10, No. 10, pp. 88-89, New York, (1998)
    • (1998) Scientific American , vol.10 , Issue.10 , pp. 88-89
    • Rivest, R.1
  • 309
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate revocation lists?
    • Proceedings of Financial Cryptography 98, Springer Verlag, Heidelberg
    • Rivest R.L.: Can We Eliminate Revocation Lists? Proceedings of Financial Cryptography 98, Lecture Notes in Computer Science, Vol. 1465, pp. 178-183, Springer Verlag, Heidelberg, (1998)
    • (1998) Lecture Notes in Computer Science , vol.1465 , pp. 178-183
    • Rivest, R.L.1
  • 310
    • 84892818400 scopus 로고
    • CA requirements
    • 2.5 document. Cambridge
    • Roe M.: CA Requirements. PASSWORD Project R. 2.5 document. Cambridge, (1993)
    • (1993) PASSWORD Project R
    • Roe, M.1
  • 313
    • 85030463467 scopus 로고
    • A formal approach to security architectures
    • Brighton
    • Rüppel R.A.: A Formal Approach to Security Architectures. Proceedings of Eurocrypt 91, pp. 387-398, Brighton, (1991)
    • (1991) Proceedings of Eurocrypt 91 , pp. 387-398
    • Rüppel, R.A.1
  • 315
  • 316
    • 84979819366 scopus 로고    scopus 로고
    • New copyright regulations make their debut
    • Elsevier
    • Saxby S.: New Copyright Regulations Make Their Debut. Computer Law & Security Report, Vol. 19, No. 2, p. 443, Elsevier, (2003)
    • (2003) Computer Law & Security Report , vol.19 , Issue.2 , pp. 443
    • Saxby, S.1
  • 317
    • 84979823965 scopus 로고    scopus 로고
    • EU Gets tough on intellectual property piracy
    • Elsevier
    • Saxby S.: EU Gets Tough on Intellectual Property Piracy. Computer Law & Security, Vol. 20, No. 3, p. 163, Elsevier, (2004)
    • (2004) Computer Law & Security , vol.20 , Issue.3 , pp. 163
    • Saxby, S.1
  • 318
    • 84953635000 scopus 로고
    • Description of a New Variable-Length Key, 64-Bit Block Cipher
    • Springer Verlag, Heidelberg
    • Schneier B.: Description of a New Variable-Length Key, 64-Bit Block Cipher. Proceedings of Fast Software Encryption '93, pp. 191-204, Springer Verlag, Heidelberg, (1994)
    • (1994) Proceedings of Fast Software Encryption '93 , pp. 191-204
    • Schneier, B.1
  • 321
    • 84892830089 scopus 로고    scopus 로고
    • Regulating cryptography
    • Counterpane Inc., Mountain View
    • Schneier B.: Regulating Cryptography. Crypto-Gram Newsletter, Vol. 4, No. 09/01, p. ?, Counterpane Inc., Mountain View, (2001), http://www.schneier.eom/ crypto-gram-0109a.html#5
    • (2001) Crypto-Gram Newsletter , vol.4 , Issue.1-9
    • Schneier, B.1
  • 322
    • 1942468085 scopus 로고    scopus 로고
    • Hacking the business climate for network security
    • IEEE
    • Schneier B.: Hacking the Business Climate for Network Security. Computer, Vol. 37, No. 4, pp. 87-89, IEEE, (2004)
    • (2004) Computer , vol.37 , Issue.4 , pp. 87-89
    • Schneier, B.1
  • 323
    • 84892818234 scopus 로고    scopus 로고
    • SHA-1 broken
    • Counterpane Internet Security, Mountain View
    • Schneier B.: SHA-1 Broken. Crypto-gram Newsletter, Vol. 8, No. 03/05, p. ?, Counterpane Internet Security, Mountain View, (2005), http://www.schneier. eom/crypto-gram-0503.html#l
    • (2005) Crypto-gram Newsletter , vol.8 , Issue.3-5
    • Schneier, B.1
  • 324
    • 0242314806 scopus 로고    scopus 로고
    • Security views
    • Elsevier
    • Schultz E.: Security views. Computers & Security, Vol. 21, No. 4, pp. 293-302, Elsevier, (2002)
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 293-302
    • Schultz, E.1
  • 325
    • 0036928883 scopus 로고    scopus 로고
    • The gap between cryptography and information security
    • Elsevier
    • Schultz E.: The Gap Between Cryptography and Information Security. Computers & Security, Vol. 21, No. 8, pp. 674-676, Elsevier, (2002)
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 674-676
    • Schultz, E.1
  • 326
    • 0242314806 scopus 로고    scopus 로고
    • Security views
    • Elsevier
    • Schultz E.: Security Views. Computers & Security, Vol. 21, No. 8, pp. 677-688, Elsevier, (2002)
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 677-688
    • Schultz, E.1
  • 327
    • 0142007153 scopus 로고    scopus 로고
    • Security views
    • Elsevier
    • Schultz E.: Security Views. Computers & Security, Vol. 22, No. 7, pp. 559-569, Elsevier, (2003)
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 559-569
    • Schultz, E.1
  • 329
    • 84892801321 scopus 로고    scopus 로고
    • Symantec corporation, Cupertino
    • Security Focus: Bugtraq Archives. Symantec corporation, Cupertino, (2005), http://www.securityfocus.com/
    • (2005) Security Focus: Bugtraq Archives
  • 330
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623-656
    • Shannon CE.: A Mathematical Theory of Communication. Bell Systems Technical Journal, Vol. 27, No. ? / No. ?, pp. 379-423 / pp. 623-656, ?, (1948)
    • (1948) Bell Systems Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 331
    • 84979799710 scopus 로고    scopus 로고
    • Employee monitoring
    • Elsevier
    • Sharpe A., Rüssel C: Employee Monitoring. Computer Law & Security, Vol. 19, No. 5, pp. 411-415, Elsevier, (2003)
    • (2003) Computer Law & Security , vol.19 , Issue.5 , pp. 411-415
    • Sharpe, A.1    Rüssel, C.2
  • 333
    • 0001873077 scopus 로고
    • A fast Monte-Carlo test for primality
    • Philadelphia
    • Solovay R., Strassen V.: A Fast Monte-Carlo Test for Primality. SIAM Journal on Computing, Vol. 1977, No. 6, pp. 84-85, Philadelphia, (1977)
    • (1977) SIAM Journal on Computing , vol.1977 , Issue.6 , pp. 84-85
    • Solovay, R.1    Strassen, V.2
  • 335
    • 0003213193 scopus 로고    scopus 로고
    • IP Network Address Translator (NAT) terminology and considerations
    • Reston
    • Srisuresh P., Holdrege M.: IP Network Address Translator (NAT) Terminology and Considerations. IETF RFC 2663, Reston, (1999)
    • (1999) IETF RFC , vol.2663
    • Srisuresh, P.1    Holdrege, M.2
  • 337
    • 0036568021 scopus 로고    scopus 로고
    • Data privacy approaches from US and EU perspectives
    • Elsevier
    • Steinke G.: Data Privacy Approaches From US and EU Perspectives. Telematics and Informatics, Vol. 19, No. 2, pp. 193-200, Elsevier, (2000)
    • (2000) Telematics and Informatics , vol.19 , Issue.2 , pp. 193-200
    • Steinke, G.1
  • 338
    • 0344740897 scopus 로고    scopus 로고
    • Applying forensic techniques to information system risk management
    • Elsevier
    • Stephenson P.: Applying Forensic Techniques to Information System Risk Management. Computer Fraud & Security, Vol. 2003, No. 12, pp. 17-19, Elsevier, (2003)
    • (2003) Computer Fraud & Security , vol.2003 , Issue.12 , pp. 17-19
    • Stephenson, P.1
  • 340
    • 0142042965 scopus 로고    scopus 로고
    • Spam & sobig - Arm in arm
    • Elsevier
    • Stewart J.: Spam & Sobig - Arm in Arm. Network Security, Vol. 3, No. 10. pp. 12-16, Elsevier, (2003)
    • (2003) Network Security , vol.3 , Issue.10 , pp. 12-16
    • Stewart, J.1
  • 344
  • 345
    • 84863901332 scopus 로고    scopus 로고
    • Standards for information technology - Telecommunications and information exchange between systems - Local and metropolitan area network - Specific requirements - Part 11
    • IEEE 802.11, Piscataway
    • The Institute of Electrical and Electronics Engineers: Standards for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements - Part 11 / Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE 802.11, Piscataway, (1999), http://grouper.ieee.org/groups/ 802/ll/main.html
    • (1999) Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
  • 347
    • 0035661914 scopus 로고    scopus 로고
    • Cryptography regulations for e-commerce and digital rights management
    • Elsevier
    • Torrubia A. et al.: Cryptography Regulations for E-commerce and Digital Rights Management. Computers & Security, Vol. 20, No. 8, pp. 724-738, Elsevier, (2010)
    • (2010) Computers & Security , vol.20 , Issue.8 , pp. 724-738
    • Torrubia, A.1
  • 348
    • 30244488333 scopus 로고
    • Organization of certification authorities in a global network
    • Computer Security Institute
    • Trcek D.: Organization of Certification Authorities in a Global Network. Computer Security Journal, Vol. 10, No. 1. pp. 71-81, Computer Security Institute, (1994)
    • (1994) Computer Security Journal , vol.10 , Issue.1 , pp. 71-81
    • Trcek, D.1
  • 350
    • 0029492040 scopus 로고
    • Formal language for security services base modeling and analysis
    • Elsevier
    • Trcek D., Jerman B.B.: Formal Language for Security Services Base Modeling and Analysis. Computer Communications, Vol. 18, No. 12, pp. 921-928, Elsevier, (1995)
    • (1995) Computer Communications , vol.18 , Issue.12 , pp. 921-928
    • Trcek, D.1    Jerman, B.B.2
  • 351
    • 0031146460 scopus 로고    scopus 로고
    • Certification authorities in a global network - Procedures and guidelines for a PKI
    • Sydney
    • Trcek D., Jerman B.B.: Certification Authorities in a Global Network - Procedures and Guidelines for a PKI. Australian Computer Journal, Vol. 29, No. 2, pp. 41-47, Sydney, (1997)
    • (1997) Australian Computer Journal , vol.29 , Issue.2 , pp. 41-47
    • Trcek, D.1    Jerman, B.B.2
  • 352
    • 0346337210 scopus 로고    scopus 로고
    • Minimizing the risk of electronic document forgery
    • Elsevier
    • Trcek D.: Minimizing the Risk of Electronic Document Forgery. Computer Standards & Interfaces, Vol. 19, No. 2, pp. 161-167, Elsevier, (1998)
    • (1998) Computer Standards & Interfaces , vol.19 , Issue.2 , pp. 161-167
    • Trcek, D.1
  • 353
    • 0035118271 scopus 로고    scopus 로고
    • Slovene smart-card and IP based health-care information system infrastructure
    • Elsevier
    • Trcek D., Novak R., Kandus G., Suselj M.: Slovene Smart-card and IP Based Health-care Information System Infrastructure. International Journal of Medical Informatics, Vol. 61. No. 1, pp. 33-43, Elsevier, (2001)
    • (2001) International Journal of Medical Informatics , vol.61 , Issue.1 , pp. 33-43
    • Trcek, D.1    Novak, R.2    Kandus, G.3    Suselj, M.4
  • 354
    • 3342911569 scopus 로고    scopus 로고
    • Towards trust management standardization
    • Elsevier
    • Trcek D.: Towards Trust Management Standardization. Computer Standards and Interfaces, Vol. 26, No. 6, pp. 543-548, Elsevier, (2004)
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.6 , pp. 543-548
    • Trcek, D.1
  • 356
    • 84892792234 scopus 로고    scopus 로고
    • Business dynamics supported security policy management
    • John Wiley & Sons, Oxford
    • Trcek D.: Business Dynamics Supported Security Policy Management. Proceedings of the 22nd Conference of the SDS, John Wiley & Sons, Oxford, (2004)
    • (2004) nd Conference of the SDS
    • Trcek, D.1
  • 358
    • 84892823606 scopus 로고    scopus 로고
    • UK Government
    • UK Government: UK Government Gateway. UK Government, (2005), http://www.gateway.gov.uk/
    • (2005) UK Government Gateway
  • 359
    • 0038365269 scopus 로고    scopus 로고
    • UNCITRAL, Vienna
    • UN Commission on International Trade Law - UNCITRAL: Model Law on Electronic Commerce. UNCITRAL, Vienna, (1996) http://www.uncitral.org/english/ texts/elect-com/ecommerceindex.htm
    • (1996) Model Law on Electronic Commerce
  • 360
    • 4243838611 scopus 로고    scopus 로고
    • UNCITRAL, Vienna
    • UN Commission on International Trade Law: Model Law on Digital Signatures. UNCITRAL, Vienna, (2001) http://www.uncitral.org/english/texts/ elect-com/ecommerceindex.htm
    • (2001) Model Law on Digital Signatures
  • 361
    • 2942562850 scopus 로고    scopus 로고
    • Formal support for certificate management policies
    • Elsevier
    • Ungureanu V.: Formal Support for Certificate Management Policies. Computers & Security, Vol. 23, No. 4, pp. 300-311, Elsevier, (2004)
    • (2004) Computers & Security , vol.23 , Issue.4 , pp. 300-311
    • Ungureanu, V.1
  • 362
    • 0003969633 scopus 로고
    • US Department of Defense, DoD, standard CSC-STD-001-83, Washington D.cJ
    • US Department of Defense: Trusted Computer System Evaluation Criteria. DoD, standard CSC-STD-001-83, Washington D.cJ (1983)
    • (1983) Trusted Computer System Evaluation Criteria
  • 364
    • 84892830837 scopus 로고    scopus 로고
    • Washington D.C.
    • US Government: e-Authentication Gateway, Washington D.C., (2005), http://www.cio.gov/eauthentication/
    • (2005) E-Authentication Gateway
  • 365
    • 0003453680 scopus 로고    scopus 로고
    • US Senate / House of Representatives. US Senate / House of Representatives, Washington D.C.
    • US Senate / House of Representatives: Digital Millennium Copyright Act - DMCA. US Senate / House of Representatives, Washington D.C., (1998) http://www.copyright.gov/legislation/dmca.pdf
    • (1998) Digital Millennium Copyright Act - DMCA
  • 369
    • 84892829526 scopus 로고    scopus 로고
    • Digital dough fails to rise
    • South-borough
    • Weinberg N.: Digital Dough Fails to Rise. Network World, 04/12/99, South-borough, (1999), http://www.nwfusion.com/news/1999/0412dough.html
    • (1999) Network World, 04/12/99
    • Weinberg, N.1
  • 370
    • 0346910300 scopus 로고    scopus 로고
    • "Top-down" versus "bottom-up" - Different approaches to security
    • Elsevier
    • Wilson P.: "Top-down" versus "Bottom-up" - Different Approaches to Security. Network Security, Vol. 2003, No. 12, pp. 17-19, Elsevier, (2003)
    • (2003) Network Security , vol.2003 , Issue.12 , pp. 17-19
    • Wilson, P.1
  • 371
    • 0037328442 scopus 로고    scopus 로고
    • Biometrie system security - Part 1
    • Elsevier
    • Wirtz B.: Biometrie System Security - part 1. Biometrie Technology Today, Vol. 11, No. 2, pp. 6-8, Elsevier, (2003)
    • (2003) Biometrie Technology Today , vol.11 , Issue.2 , pp. 6-8
    • Wirtz, B.1
  • 372
    • 0037349457 scopus 로고    scopus 로고
    • Biometrie system security - Part 2
    • Elsevier
    • Wirtz B.: Biometrie System Security - part 2. Biometrie Technology Today, Vol. 11, No. 3, pp. 8-9, Elsevier, (2003)
    • (2003) Biometrie Technology Today , vol.11 , Issue.3 , pp. 8-9
    • Wirtz, B.1
  • 373
    • 1942505732 scopus 로고    scopus 로고
    • Management strategies for implementing forensic security measures
    • Elsevier
    • Wolfe-Wilson J., Wolfe B.H.: Management Strategies for Implementing Forensic Security Measures. Information Security Technical Report, Vol. 8, No. 2, pp. 55-64, Elsevier, (2003)
    • (2003) Information Security Technical Report , vol.8 , Issue.2 , pp. 55-64
    • Wolfe-Wilson, J.1    Wolfe, B.H.2
  • 375
    • 84892816916 scopus 로고    scopus 로고
    • Simple object access protocol
    • Cambridge / Sophia Antipolis / Kanagawa
    • World Wide Web Consortium: Simple Object Access Protocol. W3C Recommendations TR 20030624, Parts 0, 1 and 2, Cambridge / Sophia Antipolis / Kanagawa, (2003), http://www.w3.org/TR/soap/
    • (2003) W3C Recommendations TR 20030624, Parts 0, 1 and 2
  • 376
    • 84892794941 scopus 로고    scopus 로고
    • ZTC - A type checker for Z notation
    • Chicago
    • Xiaoping J.: ZTC - A Type Checker for Z Notation. User's Guide, Chicago, (1998)
    • (1998) User's Guide
    • Xiaoping, J.1
  • 377
    • 85011105685 scopus 로고
    • A proposal for a new block encryption standard
    • Springer Verlag, Heidelberg
    • Xuejia L, Massey J.L.: A Proposal for a New Block Encryption Standard. EUROCRYPT '90, pp. 389-404, Springer Verlag, Heidelberg, (1991)
    • (1991) EUROCRYPT '90 , pp. 389-404
    • Xuejia, L.1    Massey, J.L.2
  • 378
    • 0043027916 scopus 로고    scopus 로고
    • Overcoming PKI obstacles
    • January 4, CNET Networks Inc.
    • Young K.: Overcoming PKI Obstacles. eWeek, January 4, CNET Networks Inc., (2001), http://www.zdnet.com/
    • (2001) EWeek
    • Young, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.