메뉴 건너뛰기




Volumn 1691, Issue , 1999, Pages 247-260

Organizational modeling for efficient specification of information security requirements

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; SPECIFICATIONS;

EID: 84958970458     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48252-0_19     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 2
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • J. Backhouse and G. Dhillon. Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1):2-9, 1996.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 3
    • 0842327102 scopus 로고
    • A philosophy of security management
    • In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, IEEE Computer Society Press, Los Alamitos, CA, USA
    • D. Bailey. A philosophy of security management. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security, An Integrated Collection of Essays, pages 98-110. IEEE Computer Society Press, Los Alamitos, CA, USA, 1995.
    • (1995) Information Security, an Integrated Collection of Essays , pp. 98-110
    • Bailey, D.1
  • 4
    • 0026398826 scopus 로고
    • Risk analysis as a source of professional knowledge
    • R. Baskerville. Risk analysis as a source of professional knowledge. Computers & Security, 10(8), 1991.
    • (1991) Computers & Security , vol.10 , Issue.8
    • Baskerville, R.1
  • 5
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375-414, December 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 8
    • 84959003739 scopus 로고    scopus 로고
    • International standard ISO/IEC 15408 common criteria for information technology security evaluation (parts 1-3), version 2.0, CCIB-98-026, May
    • International standard ISO/IEC 15408 common criteria for information technology security evaluation (parts 1-3), version 2.0, CCIB-98-026, May 1998.
    • (1998)
  • 11
    • 2442621633 scopus 로고    scopus 로고
    • version 3.0. Internetdraft draft-freier-ssl-version3-02.txt, November 18
    • A. O. Freier, P. Karlton, and P. C. Kocher. The SSL protocol, version 3.0. Internetdraft draft-freier-ssl-version3-02.txt, November 18 1996.
    • (1996) The SSL Protocol
    • Freier, A.O.1    Karlton, P.2    Kocher, P.C.3
  • 16
    • 85013585900 scopus 로고    scopus 로고
    • Foreword for republishing of the Bell-LaPadula model
    • L. J. LaPadula. Foreword for republishing of the Bell-LaPadula model. Journal of Computer Security, 4:233-238, 1996.
    • (1996) Journal of Computer Security , vol.4 , pp. 233-238
    • Lapadula, L.J.1
  • 27
    • 0030377647 scopus 로고    scopus 로고
    • Information security management: The second generation
    • R. von Solms. Information security management: The second generation. Computers & Security, 15(4):281-288, 1996.
    • (1996) Computers & Security , vol.15 , Issue.4 , pp. 281-288
    • Von Solms, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.