1 |
ISO. ISO/IEC 15408-3:1999 Information technology-Security techniques-Evaluation criteria for IT security-Part 3: Security assurance requirements
|
2 |
Eun-Ser Lee and Sun-Myoung Hwang, 'Definition of Security Requirement Items and Its Process to Security and Progress Management,' LNCIS 344, August 2006
|
3 |
Nam-deok and Cho, Eun-Ser Lee, 'Design and Implementation of Semantic Web Search System using Ontology and Anchor Text,' LNCS 3984, May 2006
|
4 |
Domingue, J., Dzbor, M. and Motta, E.: Magpie: Supporting Browsing and Navigation on the Semantic Web. Proc. of Intl. Conf. on Intelligent User Interfaces (IUI). 2004. Portugal
|
5 |
정보통신부, '전자거래 안전성 강화 종합대책,' 2005. 9. 20
|
6 |
김철, '암호학의 이해,' 영풍문고, 1996
|
7 |
원동호, '암호방식과 키분배,' 한국 통신정보보호학회 학회지 제1권 1호, 1991
|
8 |
The Report of the President's Commission on Critical Infrastructure Protection CCEB (Common Criteria Editorial Board), Common Criteria for Information Technology Security Evaluation, Version 2.0, May 1998
|
9 |
Eun-Ser Lee and Sun-Myoung Hwang, 'Design Implementation of Web Security Access Control System for Semantic Web Ontoloty,' LNCS 3481, May 2005
|
10 |
양형규, 이윤호, 손기욱, 권창영, 원동호, '영지식 상호 증명 이론 연구,' 데이터 보호기술 워크 샾 논문집, 1989
|
11 |
Eun-Ser Lee and Sang-Ho Lee, 'Design progress management for Security Requirements in Ubiqiiuous computing using COQUALMO,' LNCS 3984, May 2006
|
12 |
ISO. ISO/IEC 15408-2:1999 Information technology-Security techniques-Evaluation criteria for IT security-Part 2: Security functional requirements
|
13 |
ISO/IEC 15408-1:1999 Information technology-Security techniques-Evaluation criteria for IT security-Part 1: Introduction and general model
|