共 50 条
- [1] Secure USB media considerations for a common criteria protection profile ISSE 2005 - Securing Electronic Business Processes, 2005, : 234 - 241
- [2] Application-level firewall protection profile for high robustness environments 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 38 - 42
- [3] CRITERIA AND REQUIREMENTS FOR RDT PLANT PROTECTION SYSTEMS NUCLEAR SAFETY, 1970, 11 (05): : 375 - &
- [4] Toward a medium-robustness separation kernel protection profile TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 40 - +
- [5] Information security in telecommunication networks: Criteria and protection profile 2004 INTERNATIONAL SIBERIAN WORKSHOPS AND TUTORIALS ON ELECTRON DEVICES AND MATERIALS, EDM 2004, PROCEEDINGS, 2004, : 119 - 121
- [6] Using the common criteria to elicit security requirements with use cases PROCEEDINGS OF THE IEEE SOUTHEASTCON 2006, 2006, : 273 - 278
- [7] Security Requirements Elicitation Using Method Weaving and Common Criteria MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
- [9] Ontological mapping of common criteria's security assurance requirements NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 85 - +
- [10] A comparison of the common criteria with proposals of information systems security requirements FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 654 - +