Information security assurance lifecycle research

被引:0
|
作者
XIE, Cheng-shan [1 ]
XUJIA, Gu-yue [2 ]
WANG, Li [2 ]
机构
[1] State Key Laboratory of Information Security, Beijing, 100038, China
[2] School of Economy and Management, Beihang University, Beijing, 100083, China
关键词
Security of data;
D O I
10.1016/S1005-8885(08)60042-4
中图分类号
学科分类号
摘要
引用
收藏
页码:77 / 81
相关论文
共 50 条
  • [11] Embracing the Diversity of Information Assurance & Security
    Myers, J. Paul, Jr.
    Riela, Sandra
    IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS, 2008, : 215 - +
  • [12] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [13] Tools for information security assurance arguments
    Park, JS
    Montrose, B
    Froscher, JN
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296
  • [14] Strategic planning for information security and assurance
    Port, Daniel
    Kazman, Rick
    Takenaka, Ann
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 466 - 471
  • [15] Authenticity as a Component of Information Assurance and Security
    Rogers, Corinne
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 101 - 108
  • [16] Information Lifecycle Security Risk Assessment: A tool for closing security gaps
    Bernard, Ray
    COMPUTERS & SECURITY, 2007, 26 (01) : 26 - 30
  • [17] Investigation on Electronic Network Information Security Assurance
    Lan Shourong
    Li Xiaojin
    EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 635 - 640
  • [18] Assurance Cases as a Didactic Tool for Information Security
    Gallo, Roberto
    Dahab, Ricardo
    INFORMATION SECURITY EDUCATION ACROSS THE CURRICULUM, WISE 9, 2015, 453 : 15 - 26
  • [19] Information assurance security framework for enterprise networks
    Kesari, MD
    Velayutham, T
    Sudarsan, SD
    Jagadhane, M
    Sailaja, U
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 180 - 184
  • [20] Information Systems Security Criticality and Assurance Evaluation
    Ouedraogo, Moussa
    Mouratidis, Haralambos
    Dubois, Eric
    Khadraoui, Djamel
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 38 - +