메뉴 건너뛰기




Volumn 38, Issue 1, 2007, Pages 60-80

A Review of Information Security Issues and Respective Research Contributions

Author keywords

Computer Science

Indexed keywords


EID: 85019433170     PISSN: 00950033     EISSN: None     Source Type: Journal    
DOI: 10.1145/1216218.1216224     Document Type: Article
Times cited : (174)

References (199)
  • 1
    • 0029232070 scopus 로고
    • A Higher Level of Computer Security Through Active Policies
    • Abrams, M. D. and Moffett, J. T. (1995). “A Higher Level of Computer Security Through Active Policies,” Computer & Security, Vol. 14, No. 2, pp. 147–157.
    • (1995) Computer & Security , vol.14 , Issue.2 , pp. 147-157
    • Abrams, M.D.1    Moffett, J.T.2
  • 2
    • 0011645925 scopus 로고
    • Evaluation Issues
    • Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds.), Los Alamitos, CA: IEEE Computer Society Press
    • Abrams, M. D. and Podell, H. J. (1995). “Evaluation Issues,” in Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds.), Information Security - An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press.
    • (1995) Information Security - An Integrated Collection of Essays
    • Abrams, M.D.1    Podell, H.J.2
  • 7
    • 21344459955 scopus 로고    scopus 로고
    • Structures of Responsibilities and Security of Information Systems
    • Backhouse, J. and Dhillon, G. (1996). “Structures of Responsibilities and Security of Information Systems,” European Journal of Information Systems, Vol. 5, No. 1, pp. 2–10.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-10
    • Backhouse, J.1    Dhillon, G.2
  • 9
    • 0024302579 scopus 로고
    • Can the Field of MIS be Disciplined?
    • Banville, C. and Landry, M. (1989). “Can the Field of MIS be Disciplined?” Communications of the ACM, Vol. 32, No. 1, pp. 48–60.
    • (1989) Communications of the ACM , vol.32 , Issue.1 , pp. 48-60
    • Banville, C.1    Landry, M.2
  • 11
    • 6744247045 scopus 로고
    • Logical Controls Specification: An Approach to Information System Security
    • Klein, H., and Kumar, K. (Eds.), Amsterdam: North-Holland
    • Baskerville, R. (1989). “Logical Controls Specification: An Approach to Information System Security,” in Klein, H., and Kumar, K. (Eds.), Systems Development for Human Progress, Amsterdam: North-Holland.
    • (1989) Systems Development for Human Progress
    • Baskerville, R.1
  • 12
    • 0013324190 scopus 로고
    • Risk Analysis: An Interpretative Feasibility Tool In Justifying Information Systems Security
    • Baskerville, R. (1991). “Risk Analysis: An Interpretative Feasibility Tool In Justifying Information Systems Security,” European Journal of Information Systems, Vol. 1, Is.2, pp. 121–130.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 13
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for Information Systems Development
    • Baskerville, R. (1993). “Information Systems Security Design Methods: Implications for Information Systems Development,” Computing Surveys, Vol. 25, No. 4, pp. 375–414.
    • (1993) Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 16
    • 85024287407 scopus 로고
    • Virtual Private Networks - The Major Issues, Problems and Opportunities
    • Bell, R. (1993). “Virtual Private Networks - The Major Issues, Problems and Opportunities,” IEE Colloquium on Virtual Networking.
    • (1993) IEE Colloquium on Virtual Networking.
    • Bell, R.1
  • 22
    • 0030403941 scopus 로고    scopus 로고
    • Possible Macro Virus Attacks and How to Prevent Them
    • Bontchev, V. (1996). “Possible Macro Virus Attacks and How to Prevent Them,” Computers & Security, Vol. 15, No. 7, pp. 959–626.
    • (1996) Computers & Security , vol.15 , Issue.7 , pp. 626-959
    • Bontchev, V.1
  • 23
    • 0028762817 scopus 로고
    • GSM Security: A Description of the Reasons for Security and the Techniques
    • Bookson, C. (1994). “GSM Security: A Description of the Reasons for Security and the Techniques,” IEE Colloquium on Security and Cryptography.
    • (1994) IEE Colloquium on Security and Cryptography.
    • Bookson, C.1
  • 25
    • 0029253405 scopus 로고
    • Specification and Validation of a Security Policy Model
    • Boswell, A. (1995). “Specification and Validation of a Security Policy Model,” IEEE Transaction on Software Engineering, Vol. 21, Is.2, pp. 63–68.
    • (1995) IEEE Transaction on Software Engineering , vol.21 , Issue.2 , pp. 63-68
    • Boswell, A.1
  • 26
    • 0028513851 scopus 로고
    • Digital Signatures: Are They Legal for Electronic Commerce?
    • Brown, P. W. (1994). “Digital Signatures: Are They Legal for Electronic Commerce?” IEEE Communications Magazine, Vol. 32, Is.9, pp. 76–80.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 76-80
    • Brown, P.W.1
  • 28
    • 0032738756 scopus 로고    scopus 로고
    • Digital Watermarking: From Concepts to RealTime Video Applications
    • Busch, G., Funk, W., and Wolthusen, S. (1999). “Digital Watermarking: From Concepts to RealTime Video Applications,” IEEE Computer Graphics and Applications, Vol. 19, No. 1., pp. 25–36.
    • (1999) IEEE Computer Graphics and Applications , vol.19 , Issue.1 , pp. 25-36
    • Busch, G.1    Funk, W.2    Wolthusen, S.3
  • 30
    • 6744255767 scopus 로고    scopus 로고
    • Penetration Testing Through Social Engineering
    • Ceraolo, J. P. (1996). “Penetration Testing Through Social Engineering,” Information Systems Security, Vol. 4, No. 4.
    • (1996) Information Systems Security , vol.4 , Issue.4
    • Ceraolo, J.P.1
  • 34
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Chaum, D. (1981). “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communication of ACM.
    • (1981) Communication of ACM.
    • Chaum, D.1
  • 37
  • 40
    • 85024282059 scopus 로고    scopus 로고
    • Elsevier Advanced Technology
    • Computer Fraud & Security Bulletin (2000). Elsevier Advanced Technology.
    • (2000)
  • 41
    • 84947907875 scopus 로고    scopus 로고
    • Technical Trials and Legal Tribulations
    • Craver, C. and Yeo (1998). “Technical Trials and Legal Tribulations,” Communications of the ACM, Vol. 41, No. 7, p. 45–54.
    • (1998) Communications of the ACM , vol.41 , Issue.7 , pp. 45-54
    • Craver, C.1    Yeo2
  • 42
    • 0031535076 scopus 로고    scopus 로고
    • Case Study Principles for Different Types of Cases
    • Cunningham, J. B. (1997). “Case Study Principles for Different Types of Cases,” Quality & Quantity, Vol. 31, pp. 401–423.
    • (1997) Quality & Quantity , vol.31 , pp. 401-423
    • Cunningham, J.B.1
  • 44
    • 0032595614 scopus 로고    scopus 로고
    • Software Development on Internet Time
    • Cusumano, M. A. and Yoffie, D. B. (1999). “Software Development on Internet Time,” IEEE Computer, Vol. 32, No. 10, pp. 60–69.
    • (1999) IEEE Computer , vol.32 , Issue.10 , pp. 60-69
    • Cusumano, M.A.1    Yoffie, D.B.2
  • 50
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • Denning, D.E., (1976). “A Lattice Model of Secure Information Flow,” Communication of the ACM, Vol. 19, No. 5, pp. 236–243.
    • (1976) Communication of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 51
    • 84555212697 scopus 로고
    • Passwords
    • Denning, P.J. (1992). “Passwords,” American Scientist, Vol. 80, pp. 117–120.
    • (1992) American Scientist , vol.80 , pp. 117-120
    • Denning, P.J.1
  • 52
    • 0040075289 scopus 로고    scopus 로고
    • Key Escrow Encryption Policies and Technologies
    • Denning, D.E. and Baugh, W.E., Jr. (1996). “Key Escrow Encryption Policies and Technologies,” Information Systems Security, Vol. 5, No. 2, pp. 34–44.
    • (1996) Information Systems Security , vol.5 , Issue.2 , pp. 34-44
    • Denning, D.E.1    Baugh, W.E.2
  • 55
    • 23044525969 scopus 로고    scopus 로고
    • Current Directions in IS Security Research: Toward Socioorganizational Perspectives
    • Dhillon, G. and Backhouse, J. (2001). “Current Directions in IS Security Research: Toward Socioorganizational Perspectives,” Information Systems Journal, Vol. 11, No. 2.
    • (2001) Information Systems Journal , vol.11 , Issue.2
    • Dhillon, G.1    Backhouse, J.2
  • 58
    • 85008014337 scopus 로고    scopus 로고
    • Raising the Bar on Software Security Testing
    • Dima, A., Wack, J., and Wakid, S. (1999). “Raising the Bar on Software Security Testing,” IT Professional, Vol. 1, Is.3, pp. 27–32.
    • (1999) IT Professional , vol.1 , Issue.3 , pp. 27-32
    • Dima, A.1    Wack, J.2    Wakid, S.3
  • 59
    • 1842709019 scopus 로고
    • A Methodology for Analysing Human and Computer-Related Issues in Secure Systems
    • Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Elsevier Science Publishers
    • Dobson, J. (1991). “A Methodology for Analysing Human and Computer-Related Issues in Secure Systems,” in Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Computer Security and Information Integrity, Elsevier Science Publishers.
    • (1991) Computer Security and Information Integrity
    • Dobson, J.1
  • 61
    • 85024242125 scopus 로고    scopus 로고
    • A Framework for Dealing With and Specifying Security Requirements in Information Systems
    • Dubois, E. and Wu, S. (1996). “A Framework for Dealing With and Specifying Security Requirements in Information Systems,” Proceedings of IFP SEC’96.
    • (1996) Proceedings of IFP SEC’96.
    • Dubois, E.1    Wu, S.2
  • 64
    • 0039477741 scopus 로고
    • A Cost Model for Managing Information Security Hazards
    • Ekenberg, L., Oberoi, S., and Orci, I. (1995). “A Cost Model for Managing Information Security Hazards,” Computers & Security, Vol. 14, No. 8, pp. 707–717.
    • (1995) Computers & Security , vol.14 , Issue.8 , pp. 707-717
    • Ekenberg, L.1    Oberoi, S.2    Orci, I.3
  • 73
    • 84976814937 scopus 로고
    • Choosing Appropriate Information Systems Research Methodologies
    • Galliers, R. D. and Land, F. F. (1987). “Choosing Appropriate Information Systems Research Methodologies,” Communication of the ACM, Vol. 30, No. 11, pp. 900–902.
    • (1987) Communication of the ACM , vol.30 , Issue.11 , pp. 900-902
    • Galliers, R.D.1    Land, F.F.2
  • 78
    • 11844271802 scopus 로고    scopus 로고
    • Part 1: Concepts and Models for IT Security. ISO/IEC TR 13335–1
    • GMITS (1996), Guidelines for the Management of IT Security, Part 1: Concepts and Models for IT Security. ISO/IEC TR 13335–1.
    • (1996) Guidelines for the Management of IT Security
  • 79
    • 0027617271 scopus 로고
    • Increasing Availability and Security of an Authentication Service
    • Gong, L. (1993). “Increasing Availability and Security of an Authentication Service,” IEEE Journal on Selected Areas on Communication, Vol. 11, Is.5, pp. 657–662.
    • (1993) IEEE Journal on Selected Areas on Communication , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 80
    • 0029531472 scopus 로고
    • Optimal Authentication Protocols Resistant to Password Guessing Attacks
    • IEEE Computer Society Press
    • Gong, L. (1995). “Optimal Authentication Protocols Resistant to Password Guessing Attacks,” Proceedings of the Eighth IEEE Computer Security Foundations Workshop, IEEE Computer Society Press.
    • (1995) Proceedings of the Eighth IEEE Computer Security Foundations Workshop
    • Gong, L.1
  • 81
    • 0003313661 scopus 로고    scopus 로고
    • Java Security: Present and Near Future
    • Gong, L. (1997). “Java Security: Present and Near Future,” IEEE Micro, Vol. 17, Is.3, pp. 14–19.
    • (1997) IEEE Micro , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 84
    • 0000917858 scopus 로고    scopus 로고
    • The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions
    • Harrington, S. J. (1996). “The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions,” MIS Quartely, Vol. 20, No. 3.
    • (1996) MIS Quartely , vol.20 , Issue.3
    • Harrington, S.J.1
  • 87
    • 0039372661 scopus 로고    scopus 로고
    • Viewing Business-Process Security from Different Perspectives
    • Herrmann, G. and Pernul, G. (1999). “Viewing Business-Process Security from Different Perspectives,” International Journal of Electronic Commerce, Vol. 3, No. 3, pp. 89–103.
    • (1999) International Journal of Electronic Commerce , vol.3 , Issue.3 , pp. 89-103
    • Herrmann, G.1    Pernul, G.2
  • 88
    • 84902489858 scopus 로고    scopus 로고
    • Exploring the Intellectual Structures of Information Systems Development: A Social Action Theoretic Analysis
    • Hirschheim, R., Klein, H. K., and Lyytinen, K. (1996). “Exploring the Intellectual Structures of Information Systems Development: A Social Action Theoretic Analysis, Accounting, Management and Information Technologies, Vol. 6, No. 1–2, pp. 1–64.
    • (1996) Accounting, Management and Information Technologies , vol.6 , Issue.1-2 , pp. 1-64
    • Hirschheim, R.1    Klein, H.K.2    Lyytinen, K.3
  • 91
    • 0029267472 scopus 로고
    • State Transition Analysis: A Rule-based Intrusion Detection Approach
    • Ilgun, K., Kemmerer, R. A., and Porras, P. A. (1995). “State Transition Analysis: A Rule-based Intrusion Detection Approach,” IEEE Transaction on Software Engineering, Vol. 21, No. 3, pp. 222–232.
    • (1995) IEEE Transaction on Software Engineering , vol.21 , Issue.3 , pp. 222-232
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 92
    • 0041674320 scopus 로고
    • Levels of Abstraction as a Conceptual Framework for an Information System
    • Falkenberg, E.D., and Lindgreen, P., (Eds), North-Holland, Amsterdam
    • Iivari, J. (1989). “Levels of Abstraction as a Conceptual Framework for an Information System,” In Falkenberg, E.D., and Lindgreen, P., (Eds), Information System Concepts: An In-depth Analysis., North-Holland, Amsterdam.
    • (1989) Information System Concepts: An In-depth Analysis.
    • Iivari, J.1
  • 93
    • 0001214077 scopus 로고
    • A Paradigmatic Analysis of Contemporary Schools of IS Development
    • Iivari, J. (1991). “A Paradigmatic Analysis of Contemporary Schools of IS Development,” European Journal of Information Systems, Vol. 1, No. 4, pp. 249–272.
    • (1991) European Journal of Information Systems , vol.1 , Issue.4 , pp. 249-272
    • Iivari, J.1
  • 94
    • 0030286609 scopus 로고    scopus 로고
    • Analyzing Information Systems Development: A Comparison and Analysis of Eight IS Development Approaches
    • Iivari, J. and Hirschheim, R. (1996). “Analyzing Information Systems Development: A Comparison and Analysis of Eight IS Development Approaches,” Information Systems, Vol. 21, No. 7, pp. 551–575.
    • (1996) Information Systems , vol.21 , Issue.7 , pp. 551-575
    • Iivari, J.1    Hirschheim, R.2
  • 95
    • 0032334755 scopus 로고    scopus 로고
    • A Paradigmatic Analysis of Contrasting Information Systems Development Approaches and Methodologies
    • Iivari, J., Hirschheim, R., and Klein, H. K. (1998). “A Paradigmatic Analysis of Contrasting Information Systems Development Approaches and Methodologies,” Information Systems Research, Vol. 9, No. 2, pp. 164–193.
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 164-193
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 96
    • 0034434529 scopus 로고    scopus 로고
    • A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches
    • Iivari, J., Hirschheim, R., and Klein, H. K. (2001). “A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches,” Journal of Management Information Systems, Vol. 17 No. 3, pp. 179–218.
    • (2001) Journal of Management Information Systems , vol.17 , Issue.3 , pp. 179-218
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 99
    • 0026255444 scopus 로고
    • A Uniform Presentation of Confidentiality Properties
    • Jacob, J. (1991). “A Uniform Presentation of Confidentiality Properties,” IEEE Transactions on Software Engineering, Vol. 17, No. 1, pp. 1186–1194.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.1 , pp. 1186-1194
    • Jacob, J.1
  • 100
    • 19944386389 scopus 로고
    • Solutions to the Polyinstantiation Problem
    • Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Los Alamitos, CA: IEEE Computer Society Press
    • Jajodia S., Sandhu, R. S., and Blaustein B. T. (1995). “Solutions to the Polyinstantiation Problem,” in Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Information Security, An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press.
    • (1995) Information Security, An Integrated Collection of Essays
    • Jajodia, S.1    Sandhu, R.S.2    Blaustein, B.T.3
  • 102
    • 0033078725 scopus 로고    scopus 로고
    • Steganography: The Art of Hiding Information in Plain Sight
    • IEEE
    • Jamil, T. (1999). “Steganography: The Art of Hiding Information in Plain Sight,” IEEE Potentials, Vol. 18, Is.1, pp. 10–12.
    • (1999) Potentials , vol.18 , Issue.1 , pp. 10-12
    • Jamil, T.1
  • 103
    • 0024771499 scopus 로고
    • Survey of Password Mechanisms: Weaknesses and Potential Improvements, Part 1
    • Jobush, D. L. and Oldehoeft, A. E. (1989). “Survey of Password Mechanisms: Weaknesses and Potential Improvements, Part 1,” Computers & Security, Vol. 8, pp. 587–604.
    • (1989) Computers & Security , vol.8 , pp. 587-604
    • Jobush, D.L.1    Oldehoeft, A.E.2
  • 104
    • 0031996445 scopus 로고    scopus 로고
    • Exploring Steganography: Seeing the Unseen
    • Johnson, N. F. and Jajodia, S. (1998). “Exploring Steganography: Seeing the Unseen,” IEEE Computer, Vol. 31, No. 2, pp. 26–34.
    • (1998) IEEE Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 107
    • 84976667065 scopus 로고
    • Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
    • Kemmerer, R. A. (1983). “Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels,” ACM Transaction on Computer Systems, Vol. 1, No. 3, pp. 256–277.
    • (1983) ACM Transaction on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 108
    • 0026260664 scopus 로고
    • Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
    • Kemmerer, R.A. and Porras, P.A. (1991). “Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels,” IEEE Transactions on Software Engineering, Vol. 17, No. 11, pp. 1166–1185.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.11 , pp. 1166-1185
    • Kemmerer, R.A.1    Porras, P.A.2
  • 110
    • 0029547159 scopus 로고
    • A Methodology for the Design of Security Plans
    • Koning, W. and Fred. D. (1995). “A Methodology for the Design of Security Plans,” Computers & Security, Vol. 14, No. 7, pp. 633–643.
    • (1995) Computers & Security , vol.14 , Issue.7 , pp. 633-643
    • Koning, W.1    Fred, D.2
  • 111
    • 8744316661 scopus 로고
    • Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students
    • th International Conference on Information Systems Security
    • th International Conference on Information Systems Security.
    • (1990) IFIP TC11
    • Kowalski, S.1
  • 112
    • 0032182009 scopus 로고    scopus 로고
    • Authenticated Exchange Protocols Resistant to Password Guessing Attacks
    • Is.5
    • Kwon, T. and Son, J. (1998). “Authenticated Exchange Protocols Resistant to Password Guessing Attacks,” IEE Proceedings of Communication, Vol. 145, Is.5.
    • (1998) IEE Proceedings of Communication , vol.145
    • Kwon, T.1    Son, J.2
  • 115
    • 85008539344 scopus 로고    scopus 로고
    • Biometrics: A New Era in Security
    • Lawton, G. (1998). “Biometrics: A New Era in Security,” IEEE Computer, Vol. 31, No. 8, pp. 16–18.
    • (1998) IEEE Computer , vol.31 , Issue.8 , pp. 16-18
    • Lawton, G.1
  • 118
    • 85024277184 scopus 로고    scopus 로고
    • Harmonization of Information Security Requirements
    • Leiwo, J., Gamage, C., and Zheng, Y. (1999). “Harmonization of Information Security Requirements,” Informatica, Vol. 17.
    • (1999) Informatica , vol.17
    • Leiwo, J.1    Gamage, C.2    Zheng, Y.3
  • 121
    • 0029545652 scopus 로고
    • A New Model for Information Security Policies
    • Lindup, K. R. (1995). “A New Model for Information Security Policies,” Computer & Security, Vol. 14, No. 8, pp. 691–695.
    • (1995) Computer & Security , vol.14 , Issue.8 , pp. 691-695
    • Lindup, K.R.1
  • 122
    • 0032000456 scopus 로고    scopus 로고
    • Firewalls Fend Off Invasions from the Net
    • Lodin, S. W. and Schuba, C. L. (1998). “Firewalls Fend Off Invasions from the Net,” IEEE Spectrum, Vol. 35, Is.2, pp. 26–34.
    • (1998) IEEE Spectrum , vol.35 , Issue.2 , pp. 26-34
    • Lodin, S.W.1    Schuba, C.L.2
  • 124
    • 0001935749 scopus 로고
    • A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations
    • Boland, R.J., and Hirscheim, R.A. (Eds.), Hoboken, NJ: John Wiley & Sons Ltd
    • Lyytinen, K. (1987). “A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations,” in Boland, R.J., and Hirscheim, R.A. (Eds.), Critical Issues in Information Systems Research, Hoboken, NJ: John Wiley & Sons Ltd.
    • (1987) Critical Issues in Information Systems Research
    • Lyytinen, K.1
  • 125
    • 0029537737 scopus 로고
    • Design and Natural Science Research on Information Technology
    • March, S. T. and Smith, G. F. (1995). “Design and Natural Science Research on Information Technology,” Decision Support Systems, Vol. 15, pp. 251–266.
    • (1995) Decision Support Systems , vol.15 , pp. 251-266
    • March, S.T.1    Smith, G.F.2
  • 127
    • 73549114871 scopus 로고
    • Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behaviour
    • Mathieson, K. (1991). “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behaviour,” Information System Research, Vol. 3, No. 2, pp. 173–191.
    • (1991) Information System Research , vol.3 , Issue.2 , pp. 173-191
    • Mathieson, K.1
  • 128
    • 0025211594 scopus 로고
    • The Specification and Modelling of Computer Security
    • McLean, J. (1990). “The Specification and Modelling of Computer Security,” IEEE Computer, Vol. 23, IS.1, pp. 9–16.
    • (1990) IEEE Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 132
    • 84936893490 scopus 로고
    • Vital Signs of Identity
    • Miller, B. (1994). “Vital Signs of Identity,” IEEE Spectrum, Vol. 31, Is.2, pp. 22–30.
    • (1994) IEEE Spectrum , vol.31 , Issue.2 , pp. 22-30
    • Miller, B.1
  • 133
    • 0028397595 scopus 로고
    • Authentication of Mobile Users
    • Molva, R., Samfat, D., and Tsudik, G. (1994). “Authentication of Mobile Users,” IEEE Network, Vol. 8, Is.2, pp. 26–34.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 134
    • 0030386217 scopus 로고    scopus 로고
    • Electronic Communications Risk Management: A Checklist for Business Managers
    • Moulton, R. T. and Moulton, M. E. (1996). “Electronic Communications Risk Management: A Checklist for Business Managers,” Computer & Security, Vol. 15, No. 5.
    • (1996) Computer & Security , vol.15 , Issue.5
    • Moulton, R.T.1    Moulton, M.E.2
  • 136
    • 33747065104 scopus 로고
    • Authentication
    • Anderson, T. (Ed.), Blackwell Scientific Publications
    • Needham, R. M. (1989). “Authentication,” in Anderson, T. (Ed.), Safe & Secure Computing Systems, Blackwell Scientific Publications, pp. 189–196.
    • (1989) Safe & Secure Computing Systems , pp. 189-196
    • Needham, R.M.1
  • 137
    • 8744247022 scopus 로고
    • Science and Epistemic Values
    • Niiniluoto, I. (1990). “Science and Epistemic Values,” Science Studies, Vol. 3, No. 1, pp. 21–26.
    • (1990) Science Studies , vol.3 , Issue.1 , pp. 21-26
    • Niiniluoto, I.1
  • 138
    • 48249114894 scopus 로고
    • Architectures for MLS Database Management Systems
    • Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Los Alamitos, CA: IEEE Computer Society Press
    • Notargiacomo, L. (1995). “Architectures for MLS Database Management Systems,” in Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Information Security, An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press.
    • (1995) Information Security, An Integrated Collection of Essays
    • Notargiacomo, L.1
  • 144
    • 0003356319 scopus 로고
    • Database Security
    • Yovits, M.C. (Ed.), Academic Press
    • Pernul, G. (1994). “Database Security,” Advances in Computers, Vol. 38, Yovits, M.C. (Ed.), Academic Press.
    • (1994) Advances in Computers , vol.38
    • Pernul, G.1
  • 147
    • 0031360409 scopus 로고    scopus 로고
    • First Steps Towards a European Union Policy on the Securing of Electronic Communications
    • Pounder, C. (1997). “First Steps Towards a European Union Policy on the Securing of Electronic Communications,” Computers & Security, Vol. 16, Is.7, pp. 590–594.
    • (1997) Computers & Security , vol.16 , Issue.7 , pp. 590-594
    • Pounder, C.1
  • 149
    • 84944291851 scopus 로고
    • Overview of the GSM System and Protocol Architecture
    • Rahnema, M. (1993). “Overview of the GSM System and Protocol Architecture,” IEEE Communications Magazine, pp. 92–100.
    • (1993) IEEE Communications Magazine , pp. 92-100
    • Rahnema, M.1
  • 151
    • 85024290113 scopus 로고
    • Modeling Security in Distributed Systems
    • Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Elsevier Science Publishers
    • Rieß, H. P. (1991). “Modeling Security in Distributed Systems,” in Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Computer Security and Information Integrity, Elsevier Science Publishers.
    • (1991) Computer Security and Information Integrity
    • Rieß, H.P.1
  • 152
    • 0032164210 scopus 로고    scopus 로고
    • A Survey of Web Security
    • September
    • Rubin, A. W. and Geer, D. E. (1998). “A Survey of Web Security,” IEEE Computer, September, pp. 34–41.
    • (1998) IEEE Computer , pp. 34-41
    • Rubin, A.W.1    Geer, D.E.2
  • 156
    • 84986105989 scopus 로고    scopus 로고
    • Information Security in Business Environments
    • Sanderson, E. and Forcht, K. (1996). “Information Security in Business Environments,” Computers & Security, Vol. 15, Is.4, pp. 321–322.
    • (1996) Computers & Security , vol.15 , Issue.4 , pp. 321-322
    • Sanderson, E.1    Forcht, K.2
  • 158
    • 0023999796 scopus 로고
    • The Schematic Protection Model: Its Definition and Analysis of Acyclic Attenuation Schemes
    • Sandhu, R. S. (1988). “The Schematic Protection Model: Its Definition and Analysis of Acyclic Attenuation Schemes,” Journal of the ACM, No. 2, pp. 404–432.
    • (1988) Journal of the ACM , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 160
    • 0027699087 scopus 로고
    • Lattice-based Access Controls
    • Sandhu, R. S. (1993). “Lattice-based Access Controls,” IEEE Computer, Vol. 26, No. 11, pp. 9–19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 161
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, Access Control, and Audit
    • Sandhu, R. and Samarati, P. (1996). “Authentication, Access Control, and Audit,” ACM Computing Surveys, Vol. 28, No. 1.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1
    • Sandhu, R.1    Samarati, P.2
  • 163
    • 19344364618 scopus 로고    scopus 로고
    • Role-Based Access Control
    • Academic Press
    • Sandhu, R. (1998). “Role-Based Access Control,” Advances in Computers, Vol. 46, Academic Press.
    • (1998) Advances in Computers , vol.46
    • Sandhu, R.1
  • 164
    • 0018705007 scopus 로고
    • Symmetric and Asymmetric Encryption
    • Simmons, G. J. (1979). “Symmetric and Asymmetric Encryption,” ACM Computing Surveys, Vol. 11, No. 4, pp. 305–330.
    • (1979) ACM Computing Surveys , vol.11 , Issue.4 , pp. 305-330
    • Simmons, G.J.1
  • 165
    • 0024015453 scopus 로고
    • A Survey of Information Authentication
    • Invited Paper
    • Simmons, G. J. (1988). “A Survey of Information Authentication,” Invited Paper, Proceedings of the IEEE, Vol. 76, Is. 5, pp. 603–620.
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5 , pp. 603-620
    • Simmons, G.J.1
  • 166
    • 0033683516 scopus 로고    scopus 로고
    • A Conceptual Foundation for Organizational Information Security Awareness
    • Siponen, M. T. (2000a). “A Conceptual Foundation for Organizational Information Security Awareness. Information Management & Computer Security, Vol. 8, Is.1, pp. 31–41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 169
    • 0029214917 scopus 로고
    • Business Continuity Planning
    • Smith, M. and Sherwood, J. (1995). “Business Continuity Planning,” Computers & Security, Vol. 14, No. 1, pp. 14–23.
    • (1995) Computers & Security , vol.14 , Issue.1 , pp. 14-23
    • Smith, M.1    Sherwood, J.2
  • 170
    • 85024265024 scopus 로고    scopus 로고
    • Computer Viruses
    • Denning, D. E., and Denning, P. J. (Eds.), New York: ACM Press
    • Spafford, E. G. (1998). “Computer Viruses,” in Denning, D. E., and Denning, P. J. (Eds.), Internet Besieged: Countering Cyberspace Scofflaws, New York: ACM Press, pp. 73–95.
    • (1998) Internet Besieged: Countering Cyberspace Scofflaws , pp. 73-95
    • Spafford, E.G.1
  • 173
    • 85024270902 scopus 로고    scopus 로고
    • The Model
    • v2.0
    • SSE-CMM (1999a). “The Model,” v2.0. http://www.sse-cmm.org.
    • (1999)
  • 174
    • 85024259903 scopus 로고    scopus 로고
    • The Appraisal Method
    • v2.0
    • SSE-CMM (1999b). “The Appraisal Method,” v2.0.http://www.sse-cmm.org.
    • (1999)
  • 176
    • 85024290029 scopus 로고    scopus 로고
    • An Introduction to IPSEC
    • Krause, M., and Tipton, H.F. (Eds.), Auerbach
    • Stackpole, B. (1999). “An Introduction to IPSEC,” in Krause, M., and Tipton, H.F. (Eds.), Handbook of Information Security Management, Auerbach, pp. 387–399.
    • (1999) Handbook of Information Security Management , pp. 387-399
    • Stackpole, B.1
  • 179
    • 0000280419 scopus 로고
    • Effective IS Security: An Empirical Study
    • Straub, D. W. (1990). “Effective IS Security: An Empirical Study,” Information System Research, Vol. 1, No. 2, pp. 255–277.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 180
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision Making
    • Straub, D. W. and Welke, R. J. (1998). “Coping with Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly, Vol. 22, No. 4, p. 441–464.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 183
    • 0242517401 scopus 로고    scopus 로고
    • Information Security Awareness: Educating Our Users Effectively
    • Thomson, M. E. and von Solms, R. (1998). “Information Security Awareness: Educating Our Users Effectively,” Information Management & Computer Security, Vol. 6, No. 4, pp. 167–173.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2
  • 186
    • 0032760474 scopus 로고    scopus 로고
    • Protecting Digitalimage Copyrights: A Framework
    • Voyatzis, G. and Pitas, I. (1999). “Protecting Digitalimage Copyrights: A Framework,” IEEE Computer Graphics and Applications, Vol. 19, No. 1, pp. 18–25.
    • (1999) IEEE Computer Graphics and Applications , vol.19 , Issue.1 , pp. 18-25
    • Voyatzis, G.1    Pitas, I.2
  • 189
    • 0026630927 scopus 로고
    • Authentication for Distributed Systems
    • January
    • Woo, T. Y. C. and Lam, S. S. (1992). “Authentication for Distributed Systems,” IEEE Computer, January.
    • (1992) IEEE Computer
    • Woo, T.Y.C.1    Lam, S.S.2
  • 190
    • 0018704373 scopus 로고
    • Authorization in Multilevel Database Models
    • Wood, C., Summers, R.C., and Fernandez, E.B. (1979). “Authorization in Multilevel Database Models,” Information Systems, Vol. 4, No. 2, pp. 155–163.
    • (1979) Information Systems , vol.4 , Issue.2 , pp. 155-163
    • Wood, C.1    Summers, R.C.2    Fernandez, E.B.3
  • 192
    • 84993043234 scopus 로고    scopus 로고
    • A Policy for Sending Secret Information Over Communications Networks
    • Wood, C. C. (1996). “A Policy for Sending Secret Information Over Communications Networks,” Information Management & Computer Security, Vol. 4, No. 3.
    • (1996) Information Management & Computer Security , vol.4 , Issue.3
    • Wood, C.C.1
  • 193
    • 0032754443 scopus 로고    scopus 로고
    • Watermarking 3D Objects for Verification
    • Yeo, B. L. and Yeung, M. M. (1999). “Watermarking 3D Objects for Verification.” IEEE Computer Graphics and Applications, Vol. 19, No. 1, pp. 36–46.
    • (1999) IEEE Computer Graphics and Applications , vol.19 , Issue.1 , pp. 36-46
    • Yeo, B.L.1    Yeung, M.M.2
  • 197
    • 0031163948 scopus 로고    scopus 로고
    • Secure Code Distribution
    • Zhang, X. N. (1997). “Secure Code Distribution,” IEEE Computer, Vol. 30, Is.6, pp. 76–79.
    • (1997) IEEE Computer , vol.30 , Issue.6 , pp. 76-79
    • Zhang, X.N.1
  • 199
    • 0003369812 scopus 로고
    • A Comparison of Password Techniques for Multilevel Authentication Mechanisms
    • Zviran, M. and Haga, W. J. (1993). “A Comparison of Password Techniques for Multilevel Authentication Mechanisms,” The Computer Journal, Vol. 36, No. 3, pp. 227–237.
    • (1993) The Computer Journal , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.