1 |
한국정보보호진흥원, "침입차단시스템 보호프로파일 V2.0", 2008. 4.
|
2 |
Azuma, M., "Software Quality Evaluation System : Quality Models, Metrics and Processes - International Standards and Japanese Practice", Information and Software Technology, 1996.
|
3 |
Moller, K.H. and Paulish, D.J., "Software Metrics", Chapmen & Hall(IEEE Press), 1993.
|
4 |
ISO/IEC 12119, "Information Technology - Software Package - Quality requirement and testing".
|
5 |
정지환, 김상영, 황션명, "네트워크 보안성능 평가방법에 관한 연구", 2001.
|
6 |
KISA 연구보고서, "통합시스템 보안성 평가체계 및방법 연구", 2006.
|
7 |
KISA 연구보고서, "정보보호제품 성능시험 및 보안취약성 분석 연구", 2002.
|
8 |
권원일, "지식정보보안 제품별 품질평가 방법론 연구", 한국인터넷진흥원 위탁연구과제 최종보고서, 2009. 11.
|
9 |
ISO/IEC 15408-2:2008 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional components.
|
10 |
ISO/IEC 15408-1:2009 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model.
|
11 |
ISO/IEC 15408-3:2008 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 3: Security assurance components.
|
12 |
ISO/IEC 25000:2005 Software Engineering -- Software product Quality Requirements and Evaluation (SQuaRE) -- Guide to SQuaRE.
|
13 |
홍만표 역, Panko, R. Raymond, "정보보호개론 (Corporate Computer and Nework Security)", 한티미디어, 2006.
|
14 |
IDC, "세계 정보보호산업 시장 전망 보고", 2008.
|
15 |
ISO/IEC 9126, "Information Technology - Software Quality Characteris- tics and metrics - Part 1, 2, 3".
|
16 |
ISO/IEC 14598, "Information Technology - Software product evaluation - Part 1,2,3,4,5,6".
|