1 |
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang- Joo Moon, Yoonjung Jung, Injung Kim, 'Security Risk Analysis Model for Information Systems,' LNCS 3398, Systems Modeling and Simulation: Theory and Applications: Third Asian Simulation
|
2 |
CSE, 'A Guide to Security Risk Management for IT Systems,' Government of Canada, Communications Security Establishment(CSE),' 1996
|
3 |
Young- Hwan Bang, YoonJung Jung, Injung Kim, Namhoon Lee, GangSoo Lee, 'The Design and Development for Risk Analysis Automatic Tool,' ICCSA2004, LNCS 3043, pp. 491-499, 2004
|
4 |
ISO/IEC 14598-1, 'IT-Software product evaluation, Part 1. General overview,' 1997. 3
|
5 |
Ellis Horowitz, Sartaj Sahni, Fundamentals of Computer Algorithms, Computer Science Press Inc. Computer Software Engineering Series, pp. 198-200
|
6 |
OCTAVE, 'OCATVE Criteria, Version 2.0,' Carnegie Mellon Software Engineering Institute(2001. 12), OCATVE Method Implementation Guide Version 2.0, OCTAVE, 2001. 6, http://www.sei.cmu.edu/publications/ pubweb.html
|
7 |
FIPS-191, 'Specifications for Guideline for The Analysis Local Area Network Security,' NIST, Nov. 1994
|
8 |
A. Finkelstein et al. (ed.), 'Software Process Modeling and Technology,' John Wiley&Sons, 1994
|
9 |
OCTAVE, 'OCATVE Criteria, Version 2.0,' Carnegie Mellon Software Engineering Institute(2001. 12), OCATVE Method Implementation Guide Version 2.0, OCTAVE, 2001. 6, http://www.sei.cmu.edu/publications/pubweb.html
|
10 |
SSE-CMM, 'Project, Systems Security Engineering Capability Maturity Model (SSE-CMM) - Model Description Document,' V.2, http://www.sse-crnm.org, 1999. 4. 1
|