참고문헌
- Computer & Security v.5 Integrating Security Activities into the Software Development Lifecycle and the Software Quality Assurance Process F.G. Tompkins;R. Rice
- In Information Security-The Next Decade : Proc. of IFIP Information Security Developing Policies, Procedures, and Information Security Systems Warman, A.R.
- In Information Security-The Next Decade : Proc. of IFIP Information Security A Methodology for the Development of Secure Application Systems H.A.S. Booysen;J.H.P. Eloff
- Computer & Security v.16 no.2 Information Security Embedded in the Design of Telematics Systems O. Tettero;D.J. Out;H.M. Franken;J. Schot
- ACM Comuting Surveys v.25 no.4 Information Systems Security Design Methods:Implications for Information Systems Development Baskerville R.
- Computer & Security v.13 no.4 A Methodology to Include Computer Security, Safety and Resilience Requirement as Part of the User Requirement D.N.J. Mostert;S.H. von Solms
- Computer & Security v.12 Principles of Secure Information Systems Design with Groupware Examples C.C. Wood
- Trusted Computer System Evaluation Criteria DoD
- Information Technology Security Evaluation Criteria(ITSEC), Ver.1.2 EC
- Common Criteria for Information Technology Security Evaluation CCEB
- Computer & Security v.5 Integrating Security Activities into the Software Development Lifecycle and the Software Quality Assurance Process F.G. Tompkins;R. Rice
- Information Security-Security Engineering Marshall D. Abrams;Sushil Jajodia;Harold J. Podell
- Computer & Security v.8 Framework of a Methodology for the LifeCycle of Computer Security in an Organization K.P. Badenhorst;Jan H.P. Eloff
- Proceedings of IFIP Information Security Achieving an Integrated Design : the Way Forward for Information Security Jean Hitching
- Computer & Security v.9 A Comprehensive Security System-the Concepts, Agents and Protocols S.J. Shepherd;P.W. Sanders;A. Patel
- Computer & Security v.9 Principles of Secure Information System Design C.C. Wood
- The Baseline Approach SRI
- Guidelines for the Management of IT Security
- A Code of Practice for Information Security Management BSI
- Computer & Security v.12 Organizational Issues in IT Security Peter Fagan
- Information Security-An Integrated Collection of Essays D. Bailey
- Computer Communications Security : Principles, Standard Protocols and Techniques Ford, W.
- Computer & Security v.7 Computer Security Policy : Important Issues Dr. Jan H.P. Eloff
- Computer & Security v.14 A New Model for Information Security Policies Kenneth R. Lindup
- Computer & Security v.11 Information Security Administration Model : A Management Model to Help Identify the Best Practices of the Administration Function Within the Security Group Jenus Associates
- Journal of MIS Risk Analysis for Information Technology Rex Kelly Rainer, JR.;Charles A. Snyder;H.H. Carr
- 정보화저널 v.5 no.1 Risk Analysis and Management in Public Project Selection 강동석
- WISC'98 국내환경에 적합한 IT 위험분석 표준에 관한 연구 윤정원;신순자;이병만
- WISC'95 확장능력매트릭스를 이용한 위험분석도구 선택 방법론 이영화
- 한국통신정보보호학회 종합학술발표회 논문집 v.4 no.1 해외의 보안위험분석 방법론 현황 및 분석 이성만;이필중
- Lifecycle Risk Analysis for Improved System Development ARC
- Computer & Security v.7 A Context for Information System Security Planning C.C. Wood
- Proceedings of '87 Symposium on Security and Privacy A Comparision of Commercial and Military Computer Security Policies Clark, D.D.;Wilson, D.R.
- Computer & Security v.10 A Framework for Security Requirement S.L. Pfleeger
- Computer & Security v.14 A Methodology for the Design of Security Plans W. Fred. de Koning
- Computer & Security v.10 Control is Fundamental to Successful Information Security Belden Menkus
- Information Processing Systems-open System Interconnection-basic Reference Model-security Architecture ISO
- Security in Open Systems, a Security Framework European Computer Manufactors Association(ECMA)
- Contingency Planning and Disaster Recovery Strategies Butler, J.
- Computer & Security v.8 A Methodology for Penetration Testing C.P. Pfleeger;S.L. Pfleeger;M.F. Theofanos
- Comm ACM v.19 no.5 A Lattice Model of Secure Information Flow Denning, D.
- ACM Trans Comp Sys. v.1 no.3 Shared Resource Matrix Methodology Kemmerer, R.
- Proc IEE Symp Security & Privacy Covert Channel Capacity Millen, J.
- Proc. AFIPS 1977 Natl. Computer Conf. v.46 Computer System Security Evaluation P. Neumann
- TPEP Procedures NCSC
- The Design and Evaluation of INFOSEC System : The Computer Security Contribution to the Composition Discussion Tinto, M.
- Guideline for Computer Security Certification and Accrediation NBS
- Defense System Software Development DoD
- Computer & Security v.9 Auditing the Change Management Process Dr. R. Paans;Prof. Dr. I.S. Herschberg