Information security assurance lifecycle research

被引:0
|
作者
XIE, Cheng-shan [1 ]
XUJIA, Gu-yue [2 ]
WANG, Li [2 ]
机构
[1] State Key Laboratory of Information Security, Beijing, 100038, China
[2] School of Economy and Management, Beihang University, Beijing, 100083, China
关键词
Security of data;
D O I
10.1016/S1005-8885(08)60042-4
中图分类号
学科分类号
摘要
引用
收藏
页码:77 / 81
相关论文
共 50 条
  • [41] A doctoral program with specialization in information security - A high assurance constructive security approach
    Irvine, CE
    Levin, TE
    INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 173 - 180
  • [42] Research of Electric Vehicle Security Assurance and Monitoring System
    Li Haiying
    Zhang Dan
    Jia Yongli
    Qiu Xinhong
    2014 IEEE TRANSPORTATION ELECTRIFICATION CONFERENCE AND EXPO (ITEC) ASIA-PACIFIC 2014, 2014,
  • [43] Privacy Law Protection Based on the Information Security Assurance Algorithm
    Wang, Zhanjiang
    Yue, Qifeng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [44] Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension
    Mesquida, Antoni Lluis
    Mas, Antonia
    COMPUTERS & SECURITY, 2015, 48 : 19 - 34
  • [45] Protecting the network: Research directions in information assurance
    Marin, JA
    Brown, DE
    James, JR
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 249 - 252
  • [46] Empirical Research in Information Security
    Weippl, Edgar
    16TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS 2014), 2014, : 4 - 4
  • [47] A statistical overview of information system security in application quality assurance
    Soluade O.A.
    Soluade, Oredola A. (osoluade@Iona.edu), 1600, Inderscience Publishers (06): : 288 - 303
  • [48] Towards SecureBPMN - Aligning BPMN with the Information Assurance and Security Domain
    Cherdantseva, Yulia
    Hilton, Jeremy
    Rana, Omer
    BUSINESS PROCESS MODEL AND NOTATION, BPMN 2012, 2012, 125 : 107 - 115
  • [49] Survey and analysis on security control schema in information assurance criteria
    Han, Sung-il
    Kou, Kab-seung
    Lee, Gang-soo
    2006 International Conference on Hybrid Information Technology, Vol 2, Proceedings, 2006, : 482 - 488
  • [50] Learning Hands-on Information Assurance and Security on Mobile Devices
    Lo, Dan Chia-Tien
    Qian, Kai
    Chen, Wei
    Rogers, Tamara
    Ma, Kuo-Sheng
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 874 - 879