참고문헌
- S. L. Pfleeger, Software Engineering Theory and Practice, Prentice-Hall, Ch. 11, 1998
- ISO/IEC 9126, 'Information Technology ? Software Quality Characteristics and Metrics - Part 1-3
- ISO/IEC 14598, 'Information Technology ? Software Product Evaluation - Part 1-6
- 양해술, 황석형, 정문재, '소프트웨어 제품 평가를 위한 ISO 14598-3의 적용방법', 99'춘계 한국정보처리학회 학술발표 논문집, 제 6권 1호, pp. 407-410
- B. W. Boehm, Software Engineering Economics, Prentice-Hall, 1981
- B. Boehm, et. al, 'Cost Models for Furture Software Lifecycle Processes, Annals of Software Engineering Special Volume on Software Process and Production Measurement,' http://sunset.usc. edu/ COCOMO-II/ cocomo.html#conferences, 1995
- S. Chulani, 'Incorporating Baysian Analysis to Improve the Accuracy of COCOMO II and ItsQuality Model Extension,' Univ. of Southern California, 박사학위 논문, http://sunset.usc.edu/COCOMO-II/ cocomo. html#conferences, 1998.2
- 西澤 脩, '정보처리비의 원가계산 방식', 와세다상학 358호, 1994. 2
- '한국 소프트웨어사업 대가의 기준', 정보통신부고시 제 1998-4호, 1998
- CCEB, 'Common Criteria for Information Technology Security Evaluation(CC)', Version 2.0,CCIB-97/082, http://csrc.ncsl.gov, Dec 19, 1998.5
- European Communication, 'Information Security Evaluation Criteria(ITSEC),' Ver. 1.2, http://www. itsec.gov.uk, June 1991
- DoD, 'Department of Defense Trusted Computer System Evaluation Criteria (TCSEC),' Dec. 1985
- 'TPEP Procedure,' http://www.radium.ncsc.mil, June 1996
- '국내외 정보보호 시스템 가이드', 한국정보보호센터, 1998.11
- CCEB, 'Common Evaluation Methodology for Information Technology Security,' Part 1(CEM-97/07), Part 2 (Version 1.0, CEM-99/045), http://csrc.ncsl.gov
- '정보보호 시스템 평가기준(안) 0.7,' 정보보호 시스템 평가기준 워크숍, 한국정보보호센터, 1998. 11. 26
- '정보통신망 침입차단시스템 평가기준', 정보통신부고시 1998-19호, 한국정보보호센터, 1998.2
- '엔지니어링사업 대가기준', 과학기술처 공고 제 97-28호, http://www.most.go.kr/announce/notify/6.html, 1997. 7.31.
- 'Labeled Security PP,' Version 1.0, ISSO, NSA, http://csrc.nist.gov/cc/, Sept. 1998
- 'Controlled Access PP,' Version 1.b, ISSO, NSA, http://csrc.ncsl.gov/cc/, Sept. 1998
- 'U. S. Government Application-level Firewall PP for Low-risk Environment,' Version 1.a, NIST, NSA, http://csrc.nist.gov/cc, Aug. 1998
- 'U. S. Government Traffic-filter Firewall PP for Low-risk Environment,' Version 1.a, NIST, NSA, http://csrc.nist.gov/cc/, Aug. 1998
- Role-based Access Control PP Version 1.0, NIST, http://csrc.nist.gov/cc/, July 1998
- Information Technology Security Evaluation Manual(ITSEM), Commission of the European Communities, http://www.itsec.gov.uk, 1993
- 이강수, '정보보호 시스템 평가수수료 산정방안 연구', 한국정보보호센터 연구보고서, 98-11, 1998
- 장수진, 이강수, '소프트웨어 평가비 정산모델', 소프트웨어 공학연구회지, 한국정보처리학회, 2권 2호, 한국정보처리학회, pp. 19-28, 1999