참고문헌
- 김기현 외, "정보보호 기술 분류", 통신정보보호학회지, 제8권, 제1호, 1998.
- 김수동, "객체와 컴포넌트, 그리고 프레임웍", 정보처리학회지, 제10권, 제3호, 2003.
- 최성, 윤태권, "CBD 현황과 전망", 정보처리학회지, 제10권, 제3호, 2003.
- D.Carney, Assembling Large Systems from COTS Components: Opportunities, Cautions, and Complexities SEI Monographs on Use of Commercial Software in Government Systems, Software Engineering Institute, Pittsburgh, USA, June, 1996.
- Meeson, Reginald, Analysis of Secure Wrapping Technologies, Institute for Defense Analyses Alexandria, Va, 1997.
- K.Wallnau, Carney and B. Pollabk, How COTS Software Affects the Design of COTS-Intensive Systems, SEI Interactive, June, 1998.
- T. L. Saaty, Decision Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World, RWS Publications, 1995.
- C.Abts, B. Boehms, E.B.Clark, "COCOTS: A COTS Software Integration and Cost Model-Model Overview and Preliminary Data Findings", ESCOM, 2000.
- C.Abts, B.Boehms, and E.B.Clark, "COCOTS:A Software COTS-Based Systems Cost Model-Evolving Towards Maintenance Phase Modeling", ESCOM, 2001.
- Thomas G.Baker, "Lessons Learned Integrating COTS into Systems", ICCBSS 2002, Lecture Notes in Computer Science, pp.21-30, 2002.
- Nicky Boertien, Maarten W.A.Steen, Henk Honkers, "Evaluation of Component-Base-d Development Methods", Proceedings of Sixth CAiSE/IFIP8.1 International Workshop on Evaluation of Modeling Methods in Systems Analysis and Design, 4-5 June, 2001.
- Christine L. Braun, "A lifecycle process for the effective reuse of commercial off-the-shelf (COTS) software", Proceedings of the Symposium on Software reusability, pp.29-36, 1999.
- Committee on National Security Systems, National Information systems Security Glossary, No. 4009, 2003
- Committee on National Security Systems, Revised Fact Sheet, National Information Acquisition Policy, No.11, 2003.
- John C. Dean, CD, and Li Li, "Issues in Developing Security Wrapper Technology for COTSs Software Products", ICCBSS 2002, Lecture Notes in Computer Science, Vol. 2255, pp.76-85. 2002. https://doi.org/10.1007/3-540-45588-4_8
- J.C. Dean, "Security Wrapper Technology for COTS Software Products", Proceedings of 13th Annual Software Technology Conference, Utah, 2001.
- Anthony Earl, "Five Hurdles to the Successful Adoption of Component-Based COTS in a Corporate Setting", ICCBSS 2002, Lecture Notes in Computer Science, Vol.2255, pp.97-107, 2002. https://doi.org/10.1007/3-540-45588-4_10
- D.Kunda and L.Brooks, "Identifying and Classifying Processes that Support COTS Component Selection: A Case Study", European Journal of information Systems, Vol.9, No.4, pp.226-234, 2000. https://doi.org/10.1057/palgrave/ejis/3000376
- Douglas Kunda, "STACE: Social Technical Approach to COTS Software Evaluation", Component-Bases Software Quality, Lecture Notes in Computer Science, Vol.2693, pp.64-84, 2003. https://doi.org/10.1007/978-3-540-45064-1_4
- Maurizio Morisio and Marco Torchiano, "Definition and Classification of COTS: A Proposal", 1st International Contierenee, ICCBSS2002, Lecture Notes in Computer Science, Vol.2255, pp.21-35. 2002. https://doi.org/10.1007/3-540-45588-4_3
- NIST, "Security Requirement for Cryptographic Module", FIPS 140-2, 1994.
- M.Ochs, D.pfahl, G.. Chrobok-Diening and B. Nothhelfer-Kolb B., "A COTS Acquisition Process: Definition and Application Experience", Proceedings of 11th ESCOM Conference, 2000.
- Kie Sung Oh and et al., "A Selection Process of COTS Components Based on the Quality of Software in a Special Attention to Internet", HIS, Lecture Notes in Computer Science, Vol.2713, pp.626-631. 2003. https://doi.org/10.1007/3-540-45036-X_66
- Donald J.Reifer and et al., "Estimating the Cost of Security for COTS Software", ICCBSS2003, Lecture Notes in Computer Science, Vol. 2580, pp.178-186. 2003. https://doi.org/10.1007/3-540-36465-X_17
- R.Solms, J.H.P.Eloff and S.H.Soms, "Computer Security Management: A Framework for Effective Management Involvement", Information Age, Vol.24, No.4, Oct., pp.217-222. 1990.
- Fan Ye and Tim Kelly, "COTS Products Selection for Safety-Critical Systems", ICCBSS 2004, Lecture Notes in Computer Science Vol. 2959, pp.53-62. 2004. https://doi.org/10.1007/978-3-540-24645-9_17