Browse > Article

ISO/IEC JTC1/SC27 WG4(보안통제 및 서비스) 국제표준화 동향  

Youm, Heung-Youl (순천향대학교 정보보호학과)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 ISO/IEC WD 27036-2 - Information technology - Security techniques - Information security for supplier relationships - Part 2: Common Requirements, Dec. 2010
2 ISO/IEC 27036-3 - Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for ICT Supply Chain, Dec. 2010.
3 ISO/IEC 3rd WD 27037 - Information technology - Security techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence, Dec. 2010.
4 ISO/IEC WD 27038 - Information technology - Security techniques - Specifications for Digital Redaction, Dec. 2010
5 SO/IEC WD 27039 (18043) - Information technology - Security techniques - Selection, deployment, and operation of intrusion detection and prevention systems (IDPS), Dec. 2010
6 염흥열, "제9회 네트워크 및 응용보안(SC 27 WG 4) 회의," TTA 저널, No.132, TTA, 2010. 11월
7 ISO/IEC JTC 1 SC27 N9084, Resolutions of the 9th SC 27 WG 4 Plenary Meeting held in Berlin, Germany from 4 - 8 Oct. 2010.
8 ISO/IEC JTC 1/SC 27 N9085, ISO/IEC JTC 1/SC 27/WG 4 Meeting No. 9 Berlin, Germany October 4-8, 2010 Meeting Report
9 Walter Fumy, "ISO/IEC JTC1/SC27-IT Security Technique", ITU-T Workshop, Geneva Swiss, 6-7 Dec. 2010.
10 ISO/IEC 2nd CD 27032 -Information technology - Security techniques - Guidelines for Cybersecurity (N7917), Dec. 2010.
11 ISO/IEC 27033-1 - Information technology - Security techniques -- Network security - Part 1: Part 1: Guidelines for network security
12 ISO/IEC FCD 27033-2 - Information technology - Security techniques -- Network security - Part 2: Guidelines for the design and implementation of network security (N8626), Dec. 2010
13 ISO/IEC 27033-3 - Information technology - Security techniques --Network security - Part 3: Part 3: Reference networking scenarios - Threats, design, technologies and control issues
14 ISO/IEC 2nd WD 27033-4 - Information technology - Security techniques -- Network security -- Part 4: Securing Communications between networks using security gateways (N8634), Dec. 2010
15 ISO/IEC WD 27033-5 - Information technology - Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs) (N8647), Dec. 2010.
16 ISO/IEC WD 27033-6 - Information technology - Security techniques - Network security - Part 6: Securing IP Network Access using Wireless (N8647), Dec. 2010
17 ISO/IEC FCD 27034-1 - Information technology - Security techniques -- Application security - Part 1: Overview and concepts, Dec. 2010
18 ISO/IEC WD 27036-1 - Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and Concepts, Dec. 2010
19 ISO/IEC 2nd WD 27034-2 - Information technology - Security techniques - Application security - Part 2: Organisation Normative Framework, Dec. 2010
20 ISO/IEC FCD 27035 - Information technology - Security techniques - Information Security Incident Management, Dec. 2010
21 ISO/IEC JTC 1 SC 27 홈페이지, http://www.iso.org/iso/iso_technical_committee?commid=45306
22 ISO/IEC JTC 1 홈페이지, http://www.iso.org/iso/jtc1_home.html