References
- Y. J. Kim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services", Journal of the Korea Institute of Information Security and Cryptology, Vol.19, No.1, February 2009.
- S. J. Ann, "Security Monitering & Control", Lee hanmedia, April 2014.
- Korea Information Security Agency, "Guide for theproduction of Protection profiles and Security targets", July 2007.
- CC, "Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model Version 3.1 Revision 4", September 2012.
- H. J. Lee, "Reuse way of Protection Profile to draw Security Functional Requirements Based on Common Criteria", Sogang University Graduate School of Information and Communication, December 2012.
- K. S. Han, "Design of instrumentation and control system nuclear protection profile(NPP-ICS) basedon nuclear cyber security guideline", Hannam University, February 2013.
- Korea Information Security Agency, "Enterprise Security Management System Protection Profile V 2.0", September 2008.
- Korea Information Security Agency, "Intrusion Detection System Protection Profile V2.0", April 2008.
- Korea Information Security Agency, "Network Intrusion Prevention System Protection Profile V2.1", June 2010.
- Korea Information Security Agency, "Role Based Access Control System Protection Profile V2.0", July 2008.
- H. S. Jo, "A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems", information processing society journal C, Vol.16, No., February 2009.
- Y. J. Jo, "Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1", Journal of the Korea Institute of Information Security and Cryptology, Vol.24,No.5, October 10.
- CC, "Common Criteria for Information TechnologySecurity Evaluation Part 2: Security functional components Version 3.1 Revision 4", September 2012.
- NIST, "System Protection Profile-Industrial Control Systems Version 1.0", October 2004.
- H. Jung, "A Study on the Security Requirements for Developing Protection Profiles", Journal of the Korea Institute of Information Security and Cryptology, Vol.17, No.1, February 2007.
- G. S. Ko, "Support tool for cloud system security functional requirement specification", Hannam University, February 2011.
- Y. S. Kim, "Development of Security Functional Requirement Specification Tool of Information Security Operational System Level", Journal of Security Engineering, Vol.07, No.1, February 2007.