Information security assurance lifecycle research

被引:0
|
作者
XIE, Cheng-shan [1 ]
XUJIA, Gu-yue [2 ]
WANG, Li [2 ]
机构
[1] State Key Laboratory of Information Security, Beijing, 100038, China
[2] School of Economy and Management, Beihang University, Beijing, 100083, China
关键词
Security of data;
D O I
10.1016/S1005-8885(08)60042-4
中图分类号
学科分类号
摘要
引用
收藏
页码:77 / 81
相关论文
共 50 条
  • [1] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2007, (04) : 77 - 81
  • [2] Preliminary research on special assurance of network information security
    Wu, Shizhong
    Li, Shoupeng
    He, Dequan
    Tan, Yunmeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2003, 31 (01):
  • [3] Research on Information Security Assurance Model of Telecommunication Network
    Zhao, Ling
    Xu, Hong-ke
    Qian, Chao
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 184 - 187
  • [4] Research on quantitative evaluation the assurance of information security products
    Chen, Chi
    Feng, Deng-Guo
    Xu, Zhen
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2007, 35 (10): : 1886 - 1891
  • [5] Research on Information Security Assurance Model of Telecommunication Network
    Zhao, Ling
    Xu, Hong-ke
    Qian, Chao
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL VIII, 2010, : 184 - 187
  • [6] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [7] Towards Evaluation of Security Assurance during the Software Development Lifecycle
    Uusitalo, Ilkka
    Karppinen, Kaarina
    Ahonen, Pasi
    Pentikainen, Heimo
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 817 - 822
  • [8] Security evaluation for information assurance
    Kim, Yong-Tae
    Park, Gil-Cheol
    Kim, Tai-Hoon
    Lee, Sang-Ho
    ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 227 - +
  • [9] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [10] Assurance of Information Systems' Quality and Security
    Izonin, Ivan
    Hovorushchenko, Tetiana
    Popov, Peter
    Journal of Cyber Security and Mobility, 2023, 12 (03):