1 |
CCEB, "Common Criteria for Information Technology Security Evaluation(CC)," Version 2.1, CC IMB-99-033, http://csrc.ncsl.gov, August 1999. (정보보호시스템 공통평가기준, 정보통신부, 2002. 8과 내용 동일)
|
2 |
ISO/IEC PDTR 15446, "Information technology - Security techniques - Guide for the production of protection profiles and security targets", Draft, Apr 3, 2000.
|
3 |
CCEB, "Common Evaluation Methodology for Information Technology Security," Part1,2(Version 1.0, CEM-99/045), http://csrc.ncsl.gov.
|
4 |
E. W. Dijkstra, "A Discipline of Programming," Prentice-Hall, 1976.
|
5 |
한국정보보호진흥원, "국제공통평가기준 기반의 평가제출물 작성법연구," 수탁기관: 한남대학교, 2001.10.
|
6 |
조완수, "소프트웨어 개발 및 문서화 관리론," 법영사, 1998.
|
7 |
정보통신부, "정보통신망 침입차단시스템 평가기준," 정보통신부, 2000년 2월 17일 개정 및 고시, http://www.kisa.or.kr.
|
8 |
D. Meggison, "Structuring XML Documents," The definitive XML series from C.F.Goldfarb, 1998.
|
9 |
S. L. Pfleeger, "Software Engineering Theory and Practice," Prentice-Hall, Ch. 11, 1998.
|
10 |
European Communication, "Information Technol ogy Security Evaluation Manual(ITSEM)," Ver 1.2, http://www.itsec.gov.uk, June 1993.
|
11 |
UK-ITSEC Scheme, "Developers' Guide," UKS P 04, http://www.itsec.gov.uk, 1996.
|