1 |
Silvana Castano et al., 'Database security', Addison Wesly, 1994
|
2 |
Lynette Barnard, 'The evaluation and certification of information security against BS7799', Information Management & Computer Security, pp.72-77. 1998
|
3 |
한국정보보호진흥원, http://www.kisa.or.kr
|
4 |
NIST, 'Security Assessment Guide Information Technology Systems', NIST Special Publication, 800-26, 2001
|
5 |
NIST, 'AComparison of the Security Requirements for Cryptographic Modules in FlPS 140-1 and FIPS 140-2', 800-29, 2001
|
6 |
정민아 외, '역할기반 접근 제어를 적용한 데이터 베 이스 보안시스템에서의 보안정책 최소화' 한국해양정보통신학회 논문지, 제 9권 6호, pp.1364- 1370, 2005
과학기술학회마을
|
7 |
Common Criteria Project, 'Common criteria for information technology security evaluation', common criteria, 1998
|
8 |
김수연 외, '정보보호시스템 평가 . 인증체계 모델 제안', 한국정보보호학회지, 제 14권 2호, 2004.4
|
9 |
BSI, 'BS7799', BSI, 1999
|
10 |
Systems Securrty Engineering Capability Maturity Model, http://www.sse-cmm.org
|