Methodology of security engineering for industrial security management systems

被引:0
|
作者
Kim, Sangkyun [1 ]
机构
[1] Kangwon Natl Univ, Dept Ind Engn, Chunchon, South Korea
关键词
D O I
10.1016/j.jss.2007.01.019
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
下载
收藏
页码:1589 / 1589
页数:1
相关论文
共 50 条
  • [41] Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation
    Beckers, Kristian
    Fassbender, Stephan
    Heisel, Maritta
    Schmidt, Holger
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 242 - 248
  • [42] Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches
    Beckers, Kristian
    Fassbender, Stephan
    Heisel, Maritta
    Kuester, Jan-Christoph
    Schmidt, Holger
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 14 - +
  • [43] OPTICAL-SYSTEMS FOR SECURITY ENGINEERING
    RYSER, P
    OPTICAL ENGINEERING, 1995, 34 (09) : 2670 - 2674
  • [44] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [45] An Efficient Identification of Security Threats in Requirement Engineering Methodology
    Subha, R.
    Haldorai, Anandakumar
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [46] Featured Topic: Security Engineering Practices and Methodology INTRODUCTION
    Kim, Sangkyun
    Kwon, Jack
    Kim, Minhyung
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (01) : 17 - 18
  • [47] Systems analysis of security management
    Sienkiewicz, Piotr
    SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2010, 24 (96): : 93 - 99
  • [48] Security engineering methodology based on problem solving theory
    Kim, Sangkyum
    Lee, Hong Joo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 639 - 648
  • [49] A Methodology for Mobile Network Security Risk Management
    Seify, Mahdi
    Bijani, Shahriar
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1572 - +
  • [50] Risk Management Methodology for Transport Infrastructure Security
    Makarova, Irina
    Yakupova, Gulnara
    Buyvol, Polina
    Abashev, Albert
    Mukhametdinov, Eduard
    INFRASTRUCTURES, 2022, 7 (06)