메뉴 건너뛰기




Volumn 1396, Issue , 1998, Pages 232-245

A framework for the management of information security

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; SPECIFICATIONS;

EID: 84947916320     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0030424     Document Type: Conference Paper
Times cited : (4)

References (27)
  • 7
    • 0043219365 scopus 로고
    • QED Technical Publishing Group, Wellesley, MA, USA, second edition
    • E. R. Buck. Introduction to Data Security and Controls. QED Technical Publishing Group, Wellesley, MA, USA, second edition, 1991.
    • (1991) Introduction to Data Security and Controls
    • Buck, E.R.1
  • 10
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 11
    • 0003508568 scopus 로고
    • Federal Information Processing Standards Publications (FIPS PUB) 46, National Bureau of Standards, Jan
    • Federal Information Processing Standards Publications (FIPS PUB) 46. Data Encryption Standard. National Bureau of Standards, Jan. 1977.
    • (1977) Data Encryption Standard
  • 12
    • 0008464478 scopus 로고
    • Comprehensive information technology security: A new approach to respond ethical and social issues surrounding information security in the 21st century
    • Cape Town, South Africa, May
    • A. Hartmann. Comprehensive information technology security: A new approach to respond ethical and social issues surrounding information security in the 21st century. In Proceedings of the IFIP TC11 11th international conference of Information Security, Cape Town, South Africa, May 1995.
    • (1995) Proceedings of the IFIP TC11 11th international conference of Information Security
    • Hartmann, A.1
  • 14
    • 85013585900 scopus 로고    scopus 로고
    • Foreword for republishing of the Bell-LaPadula model
    • L. J. LaPadula. Foreword for republishing of the Bell-LaPadula model. Journal of Computer Security, 4:233-238, 1996.
    • (1996) Journal of Computer Security , vol.4 , pp. 233-238
    • LaPadula, L.J.1
  • 19
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21 (2):120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 20
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Nov
    • R. S. Sandhu. Lattice-based access control models. IEEE Computer, pages 9-19, Nov. 1993.
    • (1993) IEEE Computer , pp. 9-19
    • Sandhu, R.S.1
  • 22
    • 0003855464 scopus 로고    scopus 로고
    • John Wiley & Sons, New York, second edition
    • B. Schneier. Applied Cryptography. John Wiley & Sons, New York, second edition, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 26
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≤ cost (signature) + cost(encryption)
    • number 1294 in Lecture Notes in Computer Science. Springer-Verlag
    • Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) ≤ cost (signature) + cost(encryption). In Advances in Cryptology-Crypto'97, number 1294 in Lecture Notes in Computer Science. Springer-Verlag, 1997.
    • (1997) Advances in Cryptology-Crypto'97
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.