References
- M. Philpott, “IPTV: challenges and opportunities,” OVUM, 2007.
- G. O'Driscoll, “Next Generation IPTV Services and Technologies,” Wiley-Interscience, 2008.
- G. Held, “Understanding IPTV,” Taylor & Francis Group, 2007.
- ITU-T,“Security Architecture for Systems Providing End-to-end Communications Recommendation X.805,” ITU, 2003.
- W. Copper and G. Lovelace, “IPTV Guide,” Informitv and Lovelace Consulting Limited, 2006.
- S. Nicoletti et al, “Regulation of the IPTV Value Chain,” OVUM, 2007.
- HanaroTelecom, “Business Strategy of IPTV,” in Proceedings of IPTV Conference, 2007.
- KISA, “A study on Analysis of Privacy Invasion and Protection in IPTV,” KISA, 2007.
- J. H. Jeon et al, “Information Security Essential,” Scitech Media, 2009
- Bumsuk Jung et al, “Security threats to Internet: a Korean Multi-Industry Investigation,” Information & Management, vol.38, pp.487-498, 2001. https://doi.org/10.1016/S0378-7206(01)00071-4
- A. J. Bayle, “Security in Open system network: a tutorial survey,” Information Age, vol.10, no.3, pp.131-145, 1988.
- R. K. Rainer, C. A. Snyder, and H. H. Carr, “Risk analysis for information technology,” Journal of Management Information System, vol.5, no.1, pp.129-147, 1991.
- L. S. Rutledge and L. J. Hoffman, “A survey of issues in computer network security,” Computer and Security, pp.296-308, 1986.
- C. P. Pfleeger, “Security in Computing,” Prentice Hall, 2006.
- ITU, FG IPTV-DOC-0155, “Working Document : IPTV Security Aspects,” ITU, 2007.
- J. Y. Park et al, “The Standardization Issue for ITV-T FG IPTV Security Aspects,” ETRI, 2007.
- F. Stajano, “Security for Ubiquitous Computing,” John Wiley& Sons, 2002.
- D. G. Firesmith, “Analyzing Specifying Reusable Security Requirements,” Carnegie Mellon SEI, 2006.
- M. Swanson et al, “Security Metrics Guide for Information Technology Systems,” National Institute of Standards and Technology, 2003.
- Pauline Bowen et al, “Information Security Guide For Government Executives,” National Institute of Standards and Technology, 2007.
- United States Government Accountability Office, “INFORMATION SECURITY-FBI Needs to Address Weaknesses in Critical Network,” United States Government Accountability Office, 2007.
- D. G. Firesmith, “Security Use Cases,” Journal of Object Technology, vol.2, no.3, 2003.
- P. Bellavista, “An integrated management environment for network resources and services,” IEEE Journal on Selected Areas in Communications, vol.18, no.5, 2000.
- R. J. Boncella, “Web Services and Web Service Security,” in Proceedings of the Americas Conference in Information Systems, NY, 2004.
- T. Ojanpera and R. Mononen, “Security and Authentication in the Mobile World,” Wireless Personal Communications, 2002.
- T. Longstaff et al, “Security of the Internet,” The Froechlish/Kent Encyclopedia of Telecommunication, vol.15, pp.231-255, 1997.
- International Organization for Standardization, “International Electro technical Commission Informational Technology- open distributed processing,” ISO/IEC, 1996.
- National Research Council Committee on Information Systems Trustworthiness, “Trust in Cyberspace,” National Academy Press, 1999.
- U.S .Government office for Civil Rights (OCR)- http://www.hhs.gov/ocr/
- National Security Agency, “National Security Research Center Trusted Network Interpretation,” NSA, Vol.1.7/31/87 NCSC-TG-005(Red Book), 1987
- ISO, “International Organization for Standardization 27001,” ISO, 2005
- H. F. Tipton and M. Krause, “Information Security Management Handbook,” CRC Press LLC, 2008.
Cited by
- The role of public services in the convergence era: IPTV case vol.12, pp.1, 2009, https://doi.org/10.1108/14636691011015376