메뉴 건너뛰기




Volumn 5, Issue 4, 1997, Pages 138-148

Hypertext information security model for organizations

Author keywords

Data security; Hypertext; Modelling; Risk management

Indexed keywords


EID: 84986089117     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685229710184512     Document Type: Article
Times cited : (6)

References (10)
  • 1
    • 0027733285 scopus 로고
    • The risk data repository: a novel approach to security risk modelling
    • Dougall, E.G. (Ed.), Proceedings, IFIP TC 11 Ninth International Conference on Information Security, FIP Sec. '93, Toronto, Canada, 12-14 May, Elsevier, NY, pp.185-90
    • Anderson, A.M., Longley, D. and Tickle, A.B. (1993), “The risk data repository: a novel approach to security risk modelling”, Dougall, E.G. (Ed.), Proceedings, IFIP TC 11 Ninth International Conference on Information Security, FIP Sec. '93, Toronto, Canada, 12-14 May, Elsevier, NY, pp.185-90.
    • (1993)
    • Anderson, A.M.1    Longley, D.2    Tickle, A.B.3
  • 2
    • 85015112928 scopus 로고
    • Security modelling for organizations
    • Proceedings, 2nd ACM Conference on Computer nd Communications Security, 2-4 November, ACM Press, Fairfax, VA
    • Anderson, A., Kwok, L.F. and Longley, D. (1994), “Security modelling for organizations”, Proceedings, 2nd ACM Conference on Computer nd Communications Security, 2-4 November, ACM Press, Fairfax, VA, pp. 241-50.
    • (1994) , pp. 241-250
    • Anderson, A.1    Kwok, L.F.2    Longley, D.3
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: mathematical foundations and model
    • Technical Reports ESD-TR-73-278 and 2, 547, the MITRE Corporation, Bedford, MA
    • Bell, D. and Lapadula, L. (1973), “Secure computer systems: mathematical foundations and model”, Technical Reports ESD-TR-73-278 and 2, 547, the MITRE Corporation, Bedford, MA.
    • (1973)
    • Bell, D.1    Lapadula, L.2
  • 5
    • 84986117093 scopus 로고
    • A language for describing information and physical security architectures
    • Gable, G.G. (Ed.), IT Security: The Need for International Cooperation, roceedings, IFIP TC11 Eighth International Conference on Information Security, IFIP Sec. '92, Singapore, 27-29 May, Elsevier, NY
    • Caelli, W., Longley, D. and Tickle, A.B. (1992), “A language for describing information and physical security architectures”, Gable, G.G. (Ed.), IT Security: The Need for International Cooperation, roceedings, IFIP TC11 Eighth International Conference on Information Security, IFIP Sec. '92, Singapore, 27-29 May, Elsevier, NY.
    • (1992)
    • Caelli, W.1    Longley, D.2    Tickle, A.B.3
  • 6
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • 27-9 April, IEEE Computer Society Press, Oakland, CA, pp.184-94
    • Clark, D.D. and Wilson, D.R. (1987), “A comparison of commercial and military computer security policies”, Proceedings, 1987 IEEE Symposium on Security and Privacy, 27-9 April, IEEE Computer Society Press, Oakland, CA, pp.184-94.
    • (1987) Proceedings, 1987 IEEE Symposium on Security and Privacy
    • Clark, D.D.1    Wilson, D.R.2
  • 7
    • 0017677616 scopus 로고
    • Security risk assessment in electronic data processing systems
    • Courtney, R.H. Jr (1977), “Security risk assessment in electronic data processing systems, ” Proceedings, AFIPS Conference, pp. 97-104.
    • (1977) Proceedings, AFIPS Conference , pp. 97-104
    • Courtney, R.H.1
  • 9
    • 0030385768 scopus 로고    scopus 로고
    • A security officer's workbench
    • Kwok, L.F. and Longley, D. (1996), “A security officer's workbench”, Computers & Security, Vol. 15 No. 8, pp. 695-705.
    • (1996) Computers & Security , vol.15 , Issue.8 , pp. 695-705
    • Kwok, L.F.1    Longley, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.